Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

被引:7
|
作者
Bahaddad, Adel A. [1 ]
Almarhabi, Khalid Ali [2 ]
Abdel-Khalek, Sayed [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp Al Qunfudah, Dept Comp Sci, Mecca, Saudi Arabia
[3] Sohag Univ, Fac Sci, Dept Math, Sohag 82524, Egypt
关键词
Image Steganography; Encryption; Bald Eagle Search; Optimization Algorithm; Security; Pixel Selection; SEMI-TENSOR PRODUCT; ALGORITHM;
D O I
10.1016/j.aej.2023.05.051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the digital era, information security becomes a challenging process that can be miti-gated by the utilization of cryptography and steganography techniques. Earlier studies on steganog-raphy have the risk of exposing confidential data by an anonymous user. For resolving, the limitations related to the existing algorithms, one of the efficient solutions in encryption-based steganography. Encryption techniques act as an important part in protect actual data from illegal access. This study focuses on the design of Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) based image steganography technique. The presented BESOPS-CE tech-nique effectively hides the secret image in its encrypted version to the cover image. For accomplish-ing this, the BESOPS-CE technique employs a BES for optimal pixel selection (OPS) procedure. Besides, chaotic encryption was executed for encrypting the secret image, which is then embedded to choose pixel points of the cover image. Finally, embedding and extraction processes are carried out. The inclusion of the encryption process aids in accomplishing an added layer of security. A comprehensive simulation study was used to report on the BESOPS-CE approach's increased per-formance, and the results are examined from many angles. A thorough comparative analysis revealed that the BESOPS-CE model outperformed more contemporary methods.& COPY; THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:41 / 54
页数:14
相关论文
共 50 条
  • [21] Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption
    Juneja, Mamta
    Sandhu, Parvinder Singh
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 302 - 305
  • [22] Improved Bald Eagle Search Optimization Algorithm for Feature Selection in Classification
    Feng, Jinghui
    Zhang, Xukun
    Zhang, Lihua
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2024, 17 (01)
  • [23] Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform
    Darani, A. Yousefian
    Yengejeh, Y. Khedmati
    Navarro, G.
    Pakmanesh, H.
    Sharafi, J.
    DIGITAL SIGNAL PROCESSING, 2024, 144
  • [24] An image encryption algorithm based on pixel bit operation and nonlinear chaotic system
    Wang, Xingyuan
    Chen, Shengnan
    VISUAL COMPUTER, 2023, 39 (07) : 3123 - 3144
  • [25] AN IMAGE ENCRYPTION TECHNIQUE BASED ON DISCRETE WAVELET TRANSFORM AND FRACTIONAL CHAOTIC CRYPTOVIROLOGY
    Abd-elhafiez, Walaa m.
    Abdel-aty, Mahmoud
    Yang, Xiao-jun
    Balobaid, Awatef
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2024, 32 (04)
  • [26] A Secure Video Steganography with Encryption Based on LSB Technique
    Yadav, Pooja
    Mishra, Nishchol
    Sharma, Sanjeev
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 436 - 440
  • [27] A fast color image encryption technique based on three dimensional chaotic map
    Valandar, Milad Yousefi
    Barani, Milad Jafari
    Ayubi, Peyman
    OPTIK, 2019, 193
  • [28] Adaptive Partial Image Encryption Technique based on Chaotic Map
    Mandal, J. K.
    Saha, Mandrita
    Mandal, Pragati
    Sengupta, Madhumita
    Pal, Tandra
    Bhowmik, Mrinal Kanti
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 328 - 334
  • [29] Image encryption technique based on fractional chaotic time series
    Wu, Guo-Cheng
    Baleanu, Dumitru
    Lin, Zhen-Xiang
    JOURNAL OF VIBRATION AND CONTROL, 2016, 22 (08) : 2092 - 2099
  • [30] Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation
    Cao, Guanghui
    Wang, Xingyuan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10625 - 10647