Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

被引:9
作者
Bahaddad, Adel A. [1 ]
Almarhabi, Khalid Ali [2 ]
Abdel-Khalek, Sayed [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp Al Qunfudah, Dept Comp Sci, Mecca, Saudi Arabia
[3] Sohag Univ, Fac Sci, Dept Math, Sohag 82524, Egypt
关键词
Image Steganography; Encryption; Bald Eagle Search; Optimization Algorithm; Security; Pixel Selection; SEMI-TENSOR PRODUCT; ALGORITHM;
D O I
10.1016/j.aej.2023.05.051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the digital era, information security becomes a challenging process that can be miti-gated by the utilization of cryptography and steganography techniques. Earlier studies on steganog-raphy have the risk of exposing confidential data by an anonymous user. For resolving, the limitations related to the existing algorithms, one of the efficient solutions in encryption-based steganography. Encryption techniques act as an important part in protect actual data from illegal access. This study focuses on the design of Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) based image steganography technique. The presented BESOPS-CE tech-nique effectively hides the secret image in its encrypted version to the cover image. For accomplish-ing this, the BESOPS-CE technique employs a BES for optimal pixel selection (OPS) procedure. Besides, chaotic encryption was executed for encrypting the secret image, which is then embedded to choose pixel points of the cover image. Finally, embedding and extraction processes are carried out. The inclusion of the encryption process aids in accomplishing an added layer of security. A comprehensive simulation study was used to report on the BESOPS-CE approach's increased per-formance, and the results are examined from many angles. A thorough comparative analysis revealed that the BESOPS-CE model outperformed more contemporary methods.& COPY; THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:41 / 54
页数:14
相关论文
共 32 条
[1]  
Al-Shaarani F., 2021, J KING SAUD UNIV-COM
[2]  
ALRikabi H.T., 2021, INT J INTERACTIVE MO, V15
[3]   Novel meta-heuristic bald eagle search optimisation algorithm [J].
Alsattar, H. A. ;
Zaidan, A. A. ;
Zaidan, B. B. .
ARTIFICIAL INTELLIGENCE REVIEW, 2020, 53 (03) :2237-2264
[4]   A new chaotic complex map for robust video watermarking [J].
Ayubi, Peyman ;
Jafari Barani, Milad ;
Yousefi Valandar, Milad ;
Yosefnezhad Irani, Behzad ;
Sedagheh Maskan Sadigh, Reza .
ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (02) :1237-1280
[5]   Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application [J].
Ayubi, Peyman ;
Setayeshi, Saeed ;
Rahmani, Amir Masoud .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[6]   SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT [J].
Dhawan, Sachin ;
Chakraborty, Chinmay ;
Frnda, Jaroslav ;
Gupta, Rashmi ;
Rana, Arun Kumar ;
Pani, Subhendu Kumar .
IEEE ACCESS, 2021, 9 :87563-87578
[7]   Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications [J].
El-Shafai, Walid ;
Khallaf, Fatma ;
El-Rabaie, El-Sayed M. ;
El-Samie, Fathi E. Abd .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) :9007-9035
[8]   Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security [J].
Eshmawi, Ala' A. ;
Alsuhibany, Suliman A. ;
Abdel-Khalek, Sayed ;
Mansour, Romany F. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02) :4173-4184
[9]   Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform [J].
Faragallah, Osama S. ;
El-sayed, Hala S. ;
Afifi, Ashraf ;
El-Shafai, Walid .
OPTICS AND LASERS IN ENGINEERING, 2021, 137
[10]   Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications [J].
Faragallah, Osama S. ;
Afifi, Ashraf ;
El-Shafai, Walid ;
El-Sayed, Hala S. ;
Alzain, Mohammed A. ;
Al-Amri, Jehad F. ;
Abd El-Samie, Fathi E. .
IEEE ACCESS, 2020, 8 :103200-103218