Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

被引:7
|
作者
Bahaddad, Adel A. [1 ]
Almarhabi, Khalid Ali [2 ]
Abdel-Khalek, Sayed [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp Al Qunfudah, Dept Comp Sci, Mecca, Saudi Arabia
[3] Sohag Univ, Fac Sci, Dept Math, Sohag 82524, Egypt
关键词
Image Steganography; Encryption; Bald Eagle Search; Optimization Algorithm; Security; Pixel Selection; SEMI-TENSOR PRODUCT; ALGORITHM;
D O I
10.1016/j.aej.2023.05.051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the digital era, information security becomes a challenging process that can be miti-gated by the utilization of cryptography and steganography techniques. Earlier studies on steganog-raphy have the risk of exposing confidential data by an anonymous user. For resolving, the limitations related to the existing algorithms, one of the efficient solutions in encryption-based steganography. Encryption techniques act as an important part in protect actual data from illegal access. This study focuses on the design of Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) based image steganography technique. The presented BESOPS-CE tech-nique effectively hides the secret image in its encrypted version to the cover image. For accomplish-ing this, the BESOPS-CE technique employs a BES for optimal pixel selection (OPS) procedure. Besides, chaotic encryption was executed for encrypting the secret image, which is then embedded to choose pixel points of the cover image. Finally, embedding and extraction processes are carried out. The inclusion of the encryption process aids in accomplishing an added layer of security. A comprehensive simulation study was used to report on the BESOPS-CE approach's increased per-formance, and the results are examined from many angles. A thorough comparative analysis revealed that the BESOPS-CE model outperformed more contemporary methods.& COPY; THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:41 / 54
页数:14
相关论文
共 50 条
  • [1] Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography
    Sharath M.N.
    Rajesh T.M.
    Patil M.
    International Journal of Information Technology, 2022, 14 (5) : 2265 - 2274
  • [2] Adaptive Image Steganography Based on Pixel Selection
    Shen, Qingqing
    Liu, Guangjie
    Liu, Weiwei
    Dai, Yuewei
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 623 - 627
  • [3] A pixel permutation based image encryption technique using chaotic map
    Anwar, Shamama
    Meghana, Solleti
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (19) : 27569 - 27590
  • [4] Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
    Ragab, Mahmoud
    Alshehri, Samah
    Alhadrami, Hani A.
    Kateb, Faris
    Ashary, Ehab Bahaudien
    Abdel-khalek, S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1323 - 1338
  • [5] An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection
    Emam, Marwa M.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (03) : 361 - 366
  • [6] A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE
    Saeed, Melad J.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2013, 8 (05) : 508 - 520
  • [7] A robust audio steganography technique based on image encryption using different chaotic maps
    Nasr, Marwa A.
    El-Shafai, Walid
    El-Rabaie, El-Sayed M.
    El-Fishawy, Adel S.
    El-Hoseny, Heba M.
    Abd El-Samie, Fathi E.
    Abdel-Salam, Nariman
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [8] Evolutionary feature selection based on hybrid bald eagle search and particle swarm optimization
    Liu, Zhao
    Wang, Aimin
    Sun, Geng
    Li, Jiahui
    Bao, Haiming
    Liu, Yanheng
    INTELLIGENT DATA ANALYSIS, 2024, 28 (01) : 121 - 159
  • [9] Experimental Validation of a Global MPPT Based on Bald Eagle Search Technique
    Al Abri, Waleed
    Al Abri, Rashid
    Yousef, Hassan
    Al-Hinai, Amer
    2023 12TH INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY RESEARCH AND APPLICATIONS, ICRERA, 2023, : 636 - 650
  • [10] A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography
    M N Sharath
    T M Rajesh
    Mallanagouda Patil
    Multimedia Tools and Applications, 2023, 82 : 25197 - 25216