An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images

被引:1
作者
Rathika, S. [1 ]
Gayathri, R. [1 ]
机构
[1] Annamalai Univ, Dept Elect & Commun Engn, Chidambaram 608002, Tamil Nadu, India
关键词
Image steganography; Thermal images; Security; Optimal pixel selection; Monarchy butterfly optimization algorithm; CRYPTANALYSIS; ALGORITHM;
D O I
10.1007/s11042-023-15693-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security provides a process of hiding secret information to protect the sensitive data from attackers. To achieve secure data transmission, data hiding and steganographic techniques are being developed. Image steganography is commonly employed in several areas such as telecommunication, mobile computing, online voting system, image retrieval, and privacy of patient details. Furthermore, encryption technique acts as an integral part to save the original data from illegal access. In this view, this paper presents a new monarchy butterfly optimization algorithm-based encryption with image steganography for hiding information in thermal images (MBOA-ESTI). The presented MBOA-ESTI method includes various phases of operations like ensemble of encryption, channel extraction, optimal pixel selection, embedded process, and decomposition. Then, the encryption of the images takes place by using three encryption systems Rubik's Cube Principle (RCP), Henon map (HM), and improved chaotic map (ICM). In addition, the presented MBOA-ESTI model involves multilevel discrete wavelet transform (DWT) based image decomposition process. In addition, the optimum pixel selection technique is performed using MBOA over the encrypted R, G, and B channels. For investigating the outcome of the MBOA-ESTI technique, wide-ranging experimentation was performed using MATLAB R2014a tool and the outcomes are examined interms of discrete performance measures. The experimental outcomes pointed out that the MBOA-ESTI model has resulted in an average mean square error (MSE) of 0.093, peak signal to noise ratio (PSNR) of 58.46dB, and normalized cross-correlation (NCC) of 0.997.
引用
收藏
页码:47235 / 47252
页数:18
相关论文
共 30 条
[1]   Encryption-based steganography of images by multiobjective whale optimal pixel selection [J].
Ambika ;
Biradar R.L. ;
Burkpalli V. .
International Journal of Computers and Applications, 2022, 44 (12) :1140-1149
[2]   RETRACTED: Development of air quality monitoring (AQM) models using different machine learning approaches (Retracted Article) [J].
Amuthadevi, C. ;
Vijayan, D. S. ;
Ramachandran, Varatharajan .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (Suppl 1) :33-33
[3]   Extreme learning machine based optimal embedding location finder for image steganography [J].
Atee, Hayfaa Abdulzahra ;
Ahmad, Robiah ;
Noor, Norliza Mohd ;
Rahma, Abdul Monem S. ;
Aljeroudi, Yazan .
PLOS ONE, 2017, 12 (02)
[4]   Optimum spectrum mask based medical image fusion using Gray Wolf Optimization [J].
Daniel, Ebenezer ;
Anitha, J. ;
Kamaleshwaran, K. K. ;
Rani, Indu .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2017, 34 :36-43
[5]   ESA: a hybrid bio-inspired metaheuristic optimization approach for engineering problems [J].
Dhiman, Gaurav .
ENGINEERING WITH COMPUTERS, 2021, 37 (01) :323-353
[6]   Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems [J].
Dhiman, Gaurav ;
Kumar, Vijay .
KNOWLEDGE-BASED SYSTEMS, 2019, 165 :169-196
[7]   An overview of steganography techniques applied to the protection of biometric data [J].
Douglas, Mandy ;
Bailey, Karen ;
Leeney, Mark ;
Curran, Kevin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) :17333-17373
[8]   Coverless Steganography for Digital Images Based on a Generative Model [J].
Duan, Xintao ;
Song, Haoxian ;
Qin, Chuan ;
Khan, Muhammad Khurram .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03) :483-493
[9]   Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems [J].
Hashim, Fatma A. ;
Hussain, Kashif ;
Houssein, Essam H. ;
Mabrouk, Mai S. ;
Al-Atabany, Walid .
APPLIED INTELLIGENCE, 2021, 51 (03) :1531-1551
[10]   2-DIMENSIONAL MAPPING WITH A STRANGE ATTRACTOR [J].
HENON, M .
COMMUNICATIONS IN MATHEMATICAL PHYSICS, 1976, 50 (01) :69-77