10
RESEARCH Open Access Image transformation and information hiding technology based on genetic algorithm Xiaowei Gu 1* and Yiqin Sun 2 Abstract Information hiding technology has always been a hot research field in the field of information security. How to hide information in images is also a major research field of image transformation. Todays information hiding technology has the problems of complicated encryption technology and large amount of information. Based on the genetic algorithm, this paper studies the image information hiding technology based on genetic algorithm, performs image simulation on different types of mothers, and displays the results. For the images that need to be hidden, no matter how the size changes, the mother image can achieve good information hiding. The change of the parent image is not large. Compared with the Least Significant Bit (LSB) technique, this method has a larger peak signal-to-noise. Keywords: Information hiding, Image transformation, Genetic algorithm 1 Introduction With the increasing popularity of computer network ap- plications, information security has become a hot area, and information hiding technology has become the focus of information security technology. Information hiding hides information such as plain text and password images in multimedia information, like images, videos, and audio. Since the information hiding technology mainly hides the existence of information, it is not easy to attract the atten- tion of the attacker, and only the authorized legal users can use the corresponding method to accurately extract the secret information from the carrier information. It is precisely because of this information hiding technology that shows its strong advantages and development poten- tial in the field of information security. Information hiding technology is a cross-discipline. It involves mathematics, cryptography, information theory, computer vision, and other computer application tech- nologies. It is a hot topic that researchers in various countries pay attention to and study. In the research of in- formation hiding, the research results of information hid- ing carriers are rich now. The principle is to use the redundant information existing in the image to hide the secret object in order to achieve digital signature and au- thentication or achieve secure communication. At present, it is easier to attack and intercept data transmitted over the Internet through the Internet. If some important se- cret information is maliciously destroyed or eavesdropped during transmission, it will cause incalculable losses to users. How to provide a secure transmission method for users, that is, to transmit information in a secret manner and avoid the perception of third-party recipients, has be- come an urgent problem that needs to be solved and thus has led to the rapid development of information hiding technology. After years of research, information hiding technology has developed rapidly, and many informa- tion hiding algorithms have also been proposed [14]. Although in some respects it has been relatively ma- ture, there are still a large number of practical problems to be solved such as information hiding capacity, anti-attack, and anti-statistical analysis. Therefore, there are many places where information hiding tech- nology is worth for further research to better apply to the field of information security. * Correspondence: [email protected] Xiaowei Gu and Yiqin Sun contributed equally and are co-authors of this manuscript. 1 School of Information Science and Technology, Zhejiang Sci-Tech University, 928 Second Avenue, Xiasha Higher Education Zone, Hangzhou, Zhejiang, Peoples Republic of China Full list of author information is available at the end of the article EURASIP Journal on Image and Video Processing © The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 https://doi.org/10.1186/s13640-018-0348-9

Image transformation and information hiding technology

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Image transformation and information hiding technology

RESEARCH Open Access

Image transformation and informationhiding technology based on geneticalgorithmXiaowei Gu1* and Yiqin Sun2

Abstract

Information hiding technology has always been a hot research field in the field of information security. How tohide information in images is also a major research field of image transformation. Today’s information hidingtechnology has the problems of complicated encryption technology and large amount of information. Based onthe genetic algorithm, this paper studies the image information hiding technology based on genetic algorithm,performs image simulation on different types of mothers, and displays the results. For the images that need to behidden, no matter how the size changes, the mother image can achieve good information hiding. The change ofthe parent image is not large. Compared with the Least Significant Bit (LSB) technique, this method has a largerpeak signal-to-noise.

Keywords: Information hiding, Image transformation, Genetic algorithm

1 IntroductionWith the increasing popularity of computer network ap-plications, information security has become a hot area,and information hiding technology has become the focusof information security technology. Information hidinghides information such as plain text and password imagesin multimedia information, like images, videos, and audio.Since the information hiding technology mainly hides theexistence of information, it is not easy to attract the atten-tion of the attacker, and only the authorized legal userscan use the corresponding method to accurately extractthe secret information from the carrier information. It isprecisely because of this information hiding technologythat shows its strong advantages and development poten-tial in the field of information security.Information hiding technology is a cross-discipline. It

involves mathematics, cryptography, information theory,computer vision, and other computer application tech-nologies. It is a hot topic that researchers in various

countries pay attention to and study. In the research of in-formation hiding, the research results of information hid-ing carriers are rich now. The principle is to use theredundant information existing in the image to hide thesecret object in order to achieve digital signature and au-thentication or achieve secure communication. At present,it is easier to attack and intercept data transmitted overthe Internet through the Internet. If some important se-cret information is maliciously destroyed or eavesdroppedduring transmission, it will cause incalculable losses tousers. How to provide a secure transmission method forusers, that is, to transmit information in a secret mannerand avoid the perception of third-party recipients, has be-come an urgent problem that needs to be solved and thushas led to the rapid development of information hidingtechnology. After years of research, information hidingtechnology has developed rapidly, and many informa-tion hiding algorithms have also been proposed [1–4].Although in some respects it has been relatively ma-ture, there are still a large number of practical problemsto be solved such as information hiding capacity,anti-attack, and anti-statistical analysis. Therefore,there are many places where information hiding tech-nology is worth for further research to better apply tothe field of information security.

* Correspondence: [email protected] Gu and Yiqin Sun contributed equally and are co-authors of thismanuscript.1School of Information Science and Technology, Zhejiang Sci-Tech University,928 Second Avenue, Xiasha Higher Education Zone, Hangzhou, Zhejiang,People’s Republic of ChinaFull list of author information is available at the end of the article

EURASIP Journal on Imageand Video Processing

© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, andreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link tothe Creative Commons license, and indicate if changes were made.

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 https://doi.org/10.1186/s13640-018-0348-9

Page 2: Image transformation and information hiding technology

The basic idea of information hiding is to embed se-cret information into a carrier signal through an embed-ded algorithm in the process of hiding information togenerate a hidden carrier that is not easily perceived.Secret information is released through the transmissionof hidden carriers. It is difficult for a person trying to il-legally steal information to visually distinguish whetherother seemingly unknown secret information is con-cealed in this seemingly ordinary carrier signal. Even ifhidden information is found in the transmitted informa-tion, such information is difficult to extract and delete,so that information encryption transmission can be real-ized in this way. Information hiding technology plays animportant role in protecting important information frombeing destroyed or stolen. Therefore, compared withtraditional cryptography, information hiding technologyaddresses information security issues from different per-spectives. Traditional cryptography [5–8] favors protect-ing the information content itself. After being encrypted,the secret information becomes a garbled code, makingit difficult to understand, but it is also very obvious thatthis garbled is telling others that the information is veryimportant. It is easy to attract the attention of the at-tackers, stimulate the motivation of illegal interceptorsto crack confidential information, and increase the riskof this information being intercepted and attacked. In-formation hiding technology can greatly reduce theprobability that information is intercepted and attacked.However, this does not mean that information hidingtechnology can replace encryption technology becauseboth research have different aspects of protected infor-mation. It is to strengthen the security of informationfrom different perspectives. First of all, the encryptiontechnology mainly covers information by masking theinformation content, while the information hiding tech-nology is realized by covering the existence of informa-tion. Encryption process is equivalent to adding a lockon the content of information without being cracked. In-formation hiding technology is to disguise the content ofinformation through another carrier and not be discov-ered by others. Therefore, the two are not only incon-sistent but also complementary. If we can combine thetwo, we can better protect secret information.Genetic algorithm [9–11] is a computational model

designed by simulating Darwin’s genetic selection andbiological evolution. The most important idea of Dar-win’s genetic selection evolution is the survival principleof the fittest, which means that when the environmentchanges, only Individuals who can adapt to the environ-ment can survive. In the evolutionary process, individ-uals with good quality are mainly preserved andcombined through genetic manipulation, so that new in-dividuals are continuously produced. Each individual willinherit the basic characteristics of the father but will

produce new changes that are different from the parent,so that the population will evolve forward and continueto approach or obtain the optimal solution. Genetic al-gorithms have a good ability to solve complex systemoptimization problems, especially some combinatorialoptimization problems, and have been solved in complexproblems [12], image processing [13, 14], image parti-tioning [15, 16], machine learning [17, 18], and artificiallife [19, 20]; and other fields have been successfully ap-plied and show good performance.At present, the main contents of information hiding al-

gorithm research include the relationship between the em-bedded strength of information [21, 22], hidden capacity[23, 24], and imperceptibility. In order to find hidden algo-rithms that meet the invisibility and large capacity of thecarrier image at the same time, some scholars use geneticalgorithms to optimize the embedded parameters and findthe optimal solution, thus opening up a new research ap-proach. Genetic algorithm is an optimized search algo-rithm with strong robustness. It can quickly and efficientlycalculate complex nonlinear multidimensional data. It isgood at solving global optimization problems. Genetic al-gorithms have two distinct characteristics, namely globalsearch characteristics and parallelism. At present, the re-search of genetic algorithm in information hiding ismainly applied in some digital watermarking technologies[25]. The goal of using genetic algorithm to optimize ismainly to search for appropriate embedded parametersand embedded positions, and genetic algorithms are usedto optimize the objective function consisting of invisibilityand robustness.This chapter proposes an information hiding algorithm

based on genetic algorithm. The implementation processof genetic algorithm in information hiding is introduced,including the coding method, fitness function, selectionof genetic operator, and the processing of operating pa-rameters and constraints of genetic algorithm. The hid-den algorithm and extraction algorithm are proposed. Byapplying an airspace information hiding algorithm, thealgorithm is relatively simple and practical. In order toreduce the influence on the visual effect of the imagewhen hiding information, the optimal embedded methodof secret information is found by introducing a geneticalgorithm. Moreover, according to the requirements ofthe fitness function taken, the quality of the image afterhiding the information is greatly improved. The maincontributions of this article can be described as follows:This paper establishes image information hiding methodbased on genetic algorithm from multiple steps of popu-lation, coding, genetics, and variation and compares itwith LSB method. The simulation results show that thismethod can achieve better hiding effect and analyze theresult. In Chinese, this paper transforms hidden imagesto test the robustness of genetic algorithms.

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 2 of 10

Page 3: Image transformation and information hiding technology

2 Proposed method2.1 Genetic algorithmBecause of the uncertainty of genes in the genetic process,it is impossible to crack this process, so the use of infor-mation hiding can enhance the difficulty of cracking. Thegenetic algorithm was first proposed by Professor J.Holland in 1975. By simulating the process of natural se-lection and mating, reproduction, and mutation that occurin heredity, we started from an initial population and gen-erated random selection, crossover, and mutation opera-tions. The new and more suitable individuals for theenvironment have evolved populations into areas wherethe search space is increasingly closer to optimal solutions.Through such continuous iteration and evolution fromgeneration to generation, it gradually converges to a groupof individuals who are most suitable for the environmentand finally achieves the goal of finding the optimal solu-tion or approaching the optimal solution.The natural evolution process takes population as the

unit, through the intersection of genes, variation, and thechoice of competitive environment to achieve the continu-ous development of species. Therefore, in the geneticalgorithm, a gene is a basic genetic unit that occupies acertain position in a chromosome. It is also called a gen-etic factor. A plurality of genes compose a chromosome.The composition ratio of different genes and theirarrangement order determines the individual’s manifest-ation, namely the level of fitness. Chromosomes are themain carriers of genetic material. The internal compo-nents of genes are composed of genes. The internal genesdetermine the external performance of individuals. In gen-etic algorithms, chromosomes correspond to solutions’code. An individual is an entity with a characteristicchromosome, which is the solution in the solution spaceof a genetic algorithm. A population is a collection of gen-etically encoded individuals. The number of individuals ina population is called the population size.The genetic algorithm can effectively use the informa-

tion of the parent individuals throughout the evolution-ary process to select and speculate on the betterperforming solutions in the next generation of individ-uals. When designing a genetic algorithm, the five majorcomponents involved are parameter encoding, initialpopulation setting, fitness function determination, gen-etic manipulation, and control parameter selection. Thegenetic algorithm starts from any initialized populationand selects the good individuals with large applicabilityvalues to the next generation. Crossover is the exchangeof information between excellent individuals. Variation isthe introduction of new individuals to maintain the di-versity of populations. It is approximated by many itera-tions to the nearest point in the search space until itconverges to the optimal solution point. The populationsize refers to the total number of individuals in any

generation. The larger the population size, the morelikely it is to find a global solution, but the running timeis also relatively long. Generally, the value is between 40and 100. Different values can be selected according todifferent requirements.The basic process of genetic algorithm is shown in

Fig. 1.

2.1.1 CodingAt present, the coding methods of genetic algorithmsmainly include binary encoding and real encoding. Bin-ary coding is the genetic manipulation and calculation ofthe bit string by mapping the original problem’s solutioninto a bit string consisting of 0,1. Real-coded encodinguses the decimal method to encode the solution to theproblem and then directly performs genetic operationson the solution space. When designing and using geneticalgorithms to optimize the solution space, the first im-portant step is to encode the parameters of the problemsought. The choice of coding scheme is based on the na-ture of the problem sought and the design of the geneticoperator. This paper selects the real number encoding,which is the decimal code we often use, and geneticallymanipulates the value of the arrangement position of thepixels of the secret information as the genetic value ofthe decision variable. Moreover, the use of real-coded toavoid cross-operations and mutations may lead to thesame individual in the same chromosome. Two imageencodings (Sk-need to hide images, C-maternal images)are grouped by a certain length. It is coded as follows:

Begin

Coding

Distributivepopulation1

Fitness value

? Meet therequirements

copyoverlappingvariation

Set the population 2

Decode

Y

End

N

Fig. 1 Genetic algorithm steps

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 3 of 10

Page 4: Image transformation and information hiding technology

Sk0 ¼ Sk1

0; Sk20;…; Sk2k0� �; Ski

0∈ 0; 1;…; 2k−1−1� �

; 1≤ i≤2k ; 2≤k≤4

C0 ¼ c10; c20;…; c2k

0f g; ci∈ 0; 1;…; 2k−1� �

; 1≤ i≤2k

ð1Þ

2.1.2 Initial populationIn genetic algorithms, after the coding design, the initialpopulation needs to be set, and the iterative operation isstarted from the initial population until it terminates the it-eration according to a certain termination criterion. Thelarger the initial population size, the wider the search rangeand the longer the genetic manipulation per generation. Incontrast, the smaller the initial population setting, thesmaller the corresponding search range and the shorter thegenetic manipulation time per generation. One of the mostcommonly used initialization population methods is theunsupervised random initialization method. There are 2k!kinds of possible occurrences of Sk. When the value islarge, calculation is required for each case, the calculationdifficulty will be quite large, and the operation efficiencywill be very low. Therefore, one of the 2k! species se-quences was randomly selected as the initial population.

2.1.3 Fitness functionThe composition of the adaptation function is closely re-lated to the objective function, which is often changed bythe objective function. It is very important to choose thecorrect and reliable fitness function, because it will dir-ectly affect the convergence speed of the genetic algorithmand whether it can find the optimal solution. In order tobe able to directly relate the fitness function to the indi-vidual quality of the population in the genetic algorithm, itis specified that the fitness value is always non-negative,and in any case, the larger the fitness value is, the better.The fitness scale transformations currently used aremainly linear scale transformations, power-scale transfor-mations, and exponential scaling transformations. In thispaper, peak signal-to-noise ratio (PSNR) is used as anindex of image quality evaluation, and performance com-parison between various algorithms can be performedconveniently. The peak signal-to-noise ratio of the motherimage C and the secret image F is

PSNR ¼ 10 log10 M � N � 2552=XMi¼1

XNj¼1

½C i; jð Þ−Fði; jÞ�2" #

ð2ÞThe specific fitness function used in this algorithm can

be defined as:

Fitness ¼ w� PSNRþ c ð3Þw is the scale-up factor used to amplify the differences

between individuals in order to select individual

performance evaluations. c is a constant, it can makesome individuals with lower fitness also have the oppor-tunity to enter the next generation, in order to maintainthe diversity of the individual.

2.1.4 OperatorSelection: Selection is to select individuals with largevalues in the population to generate new populations, sothat the individual values in the population continue toconverge toward the optimal solution. The genetic algo-rithm uses a selection operator to select individuals. Theoperation process is a process in which the survival ofthe fittest takes place. Through this approach, the individ-ual’s overall quality in a group is improved. The selectionoperator can select algorithms such as roulette selection,random traversal sampling, local selection, truncated se-lection, and tournaments. The first step in the selectionprocess is to calculate the fitness. The fitness can be calcu-lated according to the proportion, or the fitness can becalculated according to the sorting method. After calculat-ing the fitness, the tall individuals who have selected theapplicable values in the parent group according to the fit-ness enter the next generation group.Crossover: Crossover is the process of selecting two

individuals from the population and exchanging parts ofthe two individuals. This is the core of the genetic algo-rithm. When there are many identical chromosomes inthe population or the chromosomes of the offspring arenot much different from the previous generation, a newgeneration of chromosomes can be generated bychromosome crossing. When using crossover operationsin a genetic algorithm, first randomly select two individ-uals to be mated in the new population, set the length ofthe selected individual bit string to k, and randomly se-lect one or more integer points n in [1, k-1] as a crossposition. Then, the crossover operation is performed ac-cording to the crossover probability P. The selected twoindividuals exchange their respective partial data accord-ing to the set requirements at the cross position to ob-tain two new individuals. Crossover operators commonlyused by genetic algorithms have a little bit of crossoverand multi-point intersections. This article chooses asingle-point crossover operator.Variation: The variation is that the offspring change

the value of a position in the string by a small probabil-ity. In binary coding, it changes 1 to 0 and 0 to 1. Muta-tion operators provide new information for thepopulation to maintain the diversity of the population’schromosomes. The use of mutation in genetic algo-rithms is based on the set mutation probability P tochange the value of the gene at the relevant gene pos-ition. The mutation operator in this paper uses amulti-point mutation operator for all gene segments.Firstly, determine whether each gene is mutated. If it is

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 4 of 10

Page 5: Image transformation and information hiding technology

mutated, then a random number is generated between[0 2k-1], which is to transform the position of some hid-den information. However, the newly generated randomnumber cannot be equal to or adjacent to the currentchromosome’s genetic value, that is, the newly generatedvalue of the mutation cannot be duplicated or adjacentto the current chromosome’s contained gene value, so asto ensure that the replaced gene value does not conflictwith the current gene value.

2.1.5 Control parametersThe control parameters mainly include population size,code length, number of iterations, mutation probability,and crossover probability. These parameters are all setto fixed values in the basic genetic algorithm. Inaddition, when selecting a specific operator, parametersrelated to the operator are also selected. The properchoice of genetic algorithm parameters directly relatesto the convergence speed and accuracy of the algorithm.However, because there are many factors influencing theparameter selection, it is necessary to combine the char-acteristics of the problem itself to make a correspondingtransformation, so that the genetic algorithm has theability to solve and optimize different types of problemsand powerful global search capabilities.

2.1.6 The choice of evolutionary termination criteriaThere are two termination conditions of the loop, one isto set the maximum termination algebra, and the otheris to terminate the loop when the conditions are met.The other is when the variance between the individualfitness in the population is less than a certain set value,the loop is terminated. In this paper, the algorithm is ter-minated if it meets the condition that the upper boundreached by the evolution algebra is 200 or the fourthconsecutive generation has no change condition. Afterthe individual with the highest fitness value finally de-codes according to the encoding rules, it becomes theinformation hiding optimal distribution scheme.

2.2 Information hiding and extractionInformation hiding steps:

1) Encrypt the image2) Select the mother image3) Optimize embedding according to the genetic

algorithm4) Calculate the optimal solution and hide the image.

Image extraction steps:

1) Extract embedded information

2) According to the value of the genetic algorithmparameters do the appropriate operation to restorethe secret information before embedding

3) The secret information is restored to the originalimage based on the scramble key and the seed.

2.3 Arnold transformThe Arnold transform is a transformation proposed bythe Russian mathematician Vladimir I. Arnold, a 2D Ar-nold of N × N digital images.Transform is defined as:

x0

y0

� �¼ a b

c d

� �nxy

� �modN ð4Þ

x, y are the pixel coordinates of the original image, andx’, y’ are the transformed pixel coordinates. Guarantee|ad-bc| = 1.

3 Experimental results3.1 Picture attributeIn order to verify the feasibility and effectiveness of thealgorithm, we chose four images as masters respectively.As shown in Fig. 4, the encrypted image has a size of512 × 256. Four master images contain one shot with aphone named MI 4. Life photos, three pictures from theInternet, two of them are color pictures, 1 is a black andwhite picture, this article was sequentially encoded as 1(life photos), 2 (Internet color pictures), 3 (Internet colorpictures), and 4 (Internet black and white). Encryptedpictures come from the Internet.

3.2 Simulation environmentThe data processing in this paper is based on theMATLAB R2014b 8.4 software environment operatingsystem for Windows 7 Ultimate Edition 64-bit SP1.

3.3 Genetic algorithm parametersIn this paper, the genetic algorithm environment is setto population size = 30, crossover probability = 0.5, mu-tation probability = 0.02, and to find the optimal solutioniterations = 200.

4 DiscussionFor image hiding technology, first of all, transform theimage you want to hide and scramble the original imageaccording to a certain coding method to form the keyform. For a RGB image, original image, R layer, G layer,and B layer images, such as Fig. 2 are shown.The scrambling of the different layers in Fig. 2 is as

shown in Fig. 3.It can be seen from the results of Fig. 3 that the

scrambling display effects of different layers are different.For example, the information of the R layer and the B

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 5 of 10

Page 6: Image transformation and information hiding technology

layer is scrambled and the background is black, andthere is a certain similarity between the two, but thescrambling result of the G layer is similar to thethree-layer encrypted image, the only difference is thecolor. To display the original image, you need to reversethe settings. This can achieve the effect of imageencryption.Four parent maps and images that need to be embed-

ded are shown in Fig. 4.

In order to be able to compare the effect of theencrypted image embedded in the mother map, this art-icle changes the photos that need to be encrypted intodifferent sizes for testing. The sizes are 512 × 256, 384 ×256, 256 × 256, and 128 × 256. After embedding the fourparent images, the effect is as shown in Fig. 5.Figure 5 shows the results of hidden pictures after they

are coded by this method and hidden behind the parentfigure. From the display results of the parent figure, the

Fig. 3 Scrambling effect (the upper left R layer is encrypted, the upper right G layer is encrypted, the lower left B layer is encrypted, and thelower right is the three-layer encrypted image)

Fig. 2 Comparison of different layers (the upper left is the original image, the upper right is the R layer image, the lower left is the G layer image,and the lower right is the B layer image)

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 6 of 10

Page 7: Image transformation and information hiding technology

hidden method of this article can maintain good visualeffects of the parent figure.LSB algorithm is a commonly used information hiding

algorithm. Peak signal-to-noise ratio represents the meritsof the algorithm. Compared with LSB algorithm, the

signal-to-noise ratio of this method is obviously higher.The result is shown in Fig. 6. The embedding effect isshown in Fig. 7. The result of Fig. 7 shows that the hiddeneffect of LSB is obviously worse than the method of thispaper (Table 1).

Fig. 5 The effect of after embedding parent image

Fig. 4 Mother map and embedded map (the first row is the embedded map, the second and third rows are the mother map)

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 7 of 10

Page 8: Image transformation and information hiding technology

Fig. 6 Comparison of two methods

Fig. 7 LSB embedding effect

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 8 of 10

Page 9: Image transformation and information hiding technology

5 ConclusionsThe hiding capacity of the algorithm proposed in thispaper can be adjusted according to specific conditions,and the amount of information per bit embedded in theimage can be reached at most. Using the idea of geneticalgorithm to get the most embedding effect, it can beseen from the experimental results that the effect of thevector image embedded in the information is basicallyconsistent with that of the original image. The algorithmalso has poor robustness and is easy to be attacked. It isalso a common problem of using the airspace to hide in-formation. As a non-deterministic quasi natural algorithm,genetic algorithm provides a new method for theoptimization of complex systems and has proved to be ef-fective. Although the genetic algorithm has a wide rangeof application value in many fields, it still has some prob-lems. The scholars in various countries have been explor-ing the improvement of the genetic algorithm so that thegenetic algorithm has a wider range of applications.

AbbreviationsLSB: Least Significant Bit; PSNR: Peak signal-to-noise ratio; RGB: Red Green Blue

AcknowledgementsThe authors thank the editor and anonymous reviewers for their helpfulcomments and valuable suggestions. I would like to acknowledge all theteam members, especially Yiqin Sun.

About the authorsXiaowei Gu was born in Rudong, Jiangsu, People’s Republic of China, in 1980.He received the Ph.D. degree in physical electronics from the University ofElectronic Science and Technology of China, Chengdu, China, in 2011. From2008 to 2011, he was with the University of Electronic Science and Technologyof China. Since 2011, he has been an associate professor with the School ofInformation Science and Technology, Zhejiang Sci-Tech University, Hangzhou,China. From 2013 to 2015, he conducted the Post-Doctoral Research with theCollege of Electrical Engineering, Zhejiang University, Hangzhou. His currentresearch interests include electronic technology, information science, andcomputational intelligence.Yiqin Sun was born in Rudong, Jiangsu, People’s Republic of China, in 1981. Shereceived her Master’s degree from the University of Electronic Science andTechnology of China, Chengdu, China, in 2008. Now, she works in KeyLaboratory for RF Circuits and Systems of Ministry of Education, HangzhouDianzi University, Hangzhou, China. Her research interests include electronicscience and computer technology, image processing, and information security.

FundingThis research was supported by the National Natural Science Foundation ofChina under grant no. 51407156, Public welfare Technology ApplicationResearch Programs of Science and Technology Department of Zhejiangprovince under grant no. 2016C33018, and the Project Grants 521 TalentsCultivation of Zhejiang Sci-Tech University and Key Laboratory for RF Circuitsand Systems (Hangzhou Dianzi University), Ministry of Education.

Availability of data and materialsWe can provide the data.

Authors’ contributionsAll authors take part in the discussion of the work described in this paper.These authors contributed equally to this work and should be consideredco-first authors. Both authors read and approved the final manuscript.

Ethics approval and consent to participateApproved.

Consent for publicationApproved.

Competing interestsThe authors declare that they have no competing interests.

Publisher’s NoteSpringer Nature remains neutral with regard to jurisdictional claims inpublished maps and institutional affiliations.

Author details1School of Information Science and Technology, Zhejiang Sci-Tech University,928 Second Avenue, Xiasha Higher Education Zone, Hangzhou, Zhejiang,People’s Republic of China. 2Key Laboratory for RF Circuits and Systems ofMinistry of Education, Hangzhou Dianzi University, 1158, No. 2 Street, XiashaHigher Education Zone, Hangzhou, Zhejiang Province 310018, People’sRepublic of China.

Received: 22 July 2018 Accepted: 28 September 2018

References1. Y.E. Wei, G.L. Wang, X.G. Gong, Internal information hiding algorithm based

on discrete cosine transform in cloud computing environment[J]. Sci.Technol. Engrg. 18(7), 166–171 (2018)

2. Z. Shou, A. Liu, S. Li, et al., Spatial outlier information hiding algorithm basedon complex transformation[C]// International Conference on Security, Privacyand Anonymity in Computation, Communication and Storage (Springer,Cham, 2017), pp. 241–255

3. Y. Liu, Information Hiding Algorithm of Wavelet Transform Based on JPEGImage[J] (Journal of Beihua University, 2017), 18(5), 697–700

4. W.A. Shukur, K.K. Jabbar, Information hiding using LSB technique based ondeveloped PSO algorithm[J]. Int. J. Electr. Comput. Engrg. 81(2), 1156–1168(2018)

5. D. Dolev, Dwork, et al., Non-malleable cryptography[J]. SIAM Rev. 45(4),727–784 (2003)

6. D. Deutsch, A. Ekert, R. Jozsa, et al., Quantum privacy amplification and thesecurity of quantum cryptography over noisy channels[J]. Phys. Rev. Lett.77(13), 2818–2821 (1996)

7. T. Jennewein, C. Simon, G. Weihs, et al., Quantum cryptography withentangled photons[J]. Phys. Rev. Lett. 84(20), 4729 (2000)

8. O. Goldreich, Foundations of cryptography: basic applications[J]. J. ACM10(509), 359–364 (2004)

9. D.E. Goldberg, Genetic algorithm in search optimization and machinelearning[J]. Addison Wesley xiii(7), 2104–2116 (1989)

10. D.E. Goldberg, D.M. Goldberg, D.E. Goldberg, et al., Genetic algorithm issearch optimization and machine learning[J]. xiii(7), 2104–2116 (1989)

11. K. Deb, S. Agrawal, A. Pratap, et al., A fast elitist non-dominated sortinggenetic algorithm for multi-objective optimisation: NSGA-II[C]// InternationalConference on Parallel Problem Solving From Nature (Springer-Verlag, 2000),pp. 849–858

12. Y. Laalaoui, N. Bouguila, Pre-run-time scheduling in real-time systems:Current researches and Artificial Intelligence perspectives[J]. Expert Systemswith Applications. 41(5), 2196–2210 (2014)

13. Jennane R, Almhdie-Imjabber A, Hambli R, et al. Genetic algorithm andimage processing for osteoporosis diagnosis[C]// International Conferenceof the IEEE Engineering in Medicine & Biology. Conf. Proc. IEEE Eng. Med.Biol. Soc., 2010:5597

Table 1 Peak signal-to-noise ratio after hiding

Image 512 × 256 384 × 256, 256 × 256 128 × 256

1 53.444 46.915 43.914 36.265

2 53.717 46.929 42.97 37.747

3 51.38 45.315 43.6 37.376

4 53.74 46.941 42.283 37.878

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 9 of 10

Page 10: Image transformation and information hiding technology

14. M. Yoshioka, S. Omatu, Noise reduction method for image processing usinggenetic algorithm[C]// IEEE International Conference on Systems, Man, andCybernetics, 1997. Comput. Cybern. Simul. IEEE, 2650–2655, 3 (2002)

15. C. Alippi, R. Cucchiara, Cluster partitioning in image analysis classification: agenetic algorithm approach[C]// CompEuro’92. ‘Computer Systems andSoftware Engineering’, proceedings. IEEE, 139–144 (1992)

16. U. Maulik, S. Bandyopadhyay, Fuzzy partitioning using a real-coded variable-length genetic algorithm for pixel classification[J]. IEEE Trans. Geosci.Remote Sens. 41(5), 1075–1081 (2003)

17. M. Asjad, S. Khan, Analysis of maintenance cost for an asset usingthegenetic algorithm[J]. International Journal of System AssuranceEngineering & Management. 8(2), 1–13 (2016)

18. A.R.F. Pinto, A.F Crepaldi, M.S Nagano. A Genetic Algorithm applied to picksequencing for billing[J]. J Int Manuf. 1–18. (2017)

19. M. Conner, C. Patel, M. Little, Genetic algorithm/artificial life evolution ofsecurity vulnerability agents[C]// Military Communications ConferenceProceedings, 1999. Milcom. IEEE 1, 739–743 (1999)

20. X.P. Wang, L.M. Cao, H.B. Shi, Design of artificial life demo system based ongenetic algorithm[J]. J. Tongji Univ. 31(2), 224–228 (2003)

21. Q. Zong, W. Guo, A speech information hiding algorithm based on theenergy difference between the frequency band[C]// InternationalConference on Consumer Electronics, Communications and Networks. IEEE,3078–3081 (2012)

22. Y. Hu, C. Zhang, Y. Su, Information hiding based on intra prediction modesfor H.264/AVC[C]// IEEE International Conference on Multimedia and Expo.IEEE, 1231–1234 (2007)

23. J. Xie, C. Yang, D. Huang, High capacity information hiding algorithm forDCT domain of image[C]// International Conference on IntelligentInformation Hiding and Multimedia Signal Processing. IEEE Comput. Soc.,269–272 (2008)

24. X.I.E. Jian-quan, Y.A.N.G. Chun-hua, X.I.E. Qing, et al., High capacityinformation hiding algorithm in a binary host image[J]. J. Chin. Comput.Syst. 29(10), 1874–1877 (2008)

25. C. Jiang, A summary to algorithms of digital multimedia information hidingtechnology and its applications of digital watermarking[J]. J. Shanxi Educ.College 2(3), 25–28 (2003)

Gu and Sun EURASIP Journal on Image and Video Processing (2018) 2018:115 Page 10 of 10