Chaotic coyote optimization algorithm for image encryption and steganography

被引:3
作者
Tong, Huawei [1 ,2 ]
Li, Tianyou [1 ,2 ]
Xu, Youyun [1 ,2 ]
Su, Xinzhong [1 ,2 ]
Qiao, Guopeng [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Telecommun & Informat Engn, 66 New model Rd, Nanjing 210003, Jiangsu, Peoples R China
[2] Natl Engn Res Ctr Commun & Networking, 66 New model Rd, Nanjing 210003, Jiangsu, Peoples R China
关键词
Metaheuristic; Encryption; Steganography; Image processing; Information security; SPATIAL DOMAIN; INFORMATION; TRANSFORM; SYSTEM;
D O I
10.1007/s11042-023-16240-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is significant to ensure the communication networks and information security, and balancing simplicity and complexity is still a real issue that is the key to improve the effectiveness of a scheme in many applications scenarios.Current researches focusing on the security of digital images and putting barriers to protect sensitive data still have room for improvement. Herein,the aim of this paper is twofold. Firstly, we propose a color image encryption method by utilizing Chaotic Coyote Optimization Algorithm to solve the key selection problem for minimizing the correlation between adjacent pixels of the cipher image, where three color channels are processed to enhance its security against various attacks. Secondly, we design a color image Steganography scheme that has ability to defend common types of the image attacks. In the design stage of embedding, the Chaotic Coyote Optimization Algorithm and a special designed strategy are implemented together to handle the problem of location selection to lower the distortion in all components of the embedded image. According to the simulation results, the proposed image encryption method is efficient and robust considering the performance indexes: correlation coefficient, information entropy, number of pixels change rate, unified average changing intensity, and histogram. Meanwhile, the image Steganography approach also provides satisfying effect compared with other methods in the literature, based on indicators of peak signal-to-noise ratio and structural similarity.
引用
收藏
页码:20861 / 20887
页数:27
相关论文
共 42 条
[1]   Efficient Quantum Information Hiding for Remote Medical Image Sharing [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Rahman, Md. Abdur ;
Alamri, Atif ;
Gupta, B. B. .
IEEE ACCESS, 2018, 6 :21075-21083
[2]   An image encryption approach using particle swarm optimization and chaotic map [J].
Ahmad M. ;
Alam M.Z. ;
Umayya Z. ;
Khan S. ;
Ahmad F. .
International Journal of Information Technology, 2018, 10 (3) :247-255
[3]   A new hybrid digital chaotic system with applications in image encryption [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je ;
Alkhawaldeh, Rami S. .
SIGNAL PROCESSING, 2019, 160 :45-58
[4]   Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain [J].
Atawneh, Samer ;
Almomani, Ammar ;
Al Bazar, Hussein ;
Sumari, Putra ;
Gupta, Brij .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (18) :18451-18472
[5]   An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography [J].
Bala Krishnan, R. ;
Rajesh Kumar, N. ;
Raajan, N. R. ;
Manikandan, G. ;
Srinivasan, A. ;
Narasimhan, D. .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) :979-995
[6]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[7]   A color image cryptosystem based on dynamic DNA encryption and chaos [J].
Chai, Xiuli ;
Fu, Xianglong ;
Gan, Zhihua ;
Lu, Yang ;
Chen, Yiran .
SIGNAL PROCESSING, 2019, 155 :44-62
[8]   Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [J].
Chuman, Tatsuya ;
Sirichotedumrong, Warit ;
Kiya, Hitoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1515-1525
[9]   Steganography and Steganalysis (in digital forensics): a Cybersecurity guide [J].
Dalal, Mukesh ;
Juneja, Mamta .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (04) :5723-5771
[10]  
Divya C.D., 2021, Discov. Artif. Intell., P10