Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

被引:7
|
作者
Bahaddad, Adel A. [1 ]
Almarhabi, Khalid Ali [2 ]
Abdel-Khalek, Sayed [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp Al Qunfudah, Dept Comp Sci, Mecca, Saudi Arabia
[3] Sohag Univ, Fac Sci, Dept Math, Sohag 82524, Egypt
关键词
Image Steganography; Encryption; Bald Eagle Search; Optimization Algorithm; Security; Pixel Selection; SEMI-TENSOR PRODUCT; ALGORITHM;
D O I
10.1016/j.aej.2023.05.051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the digital era, information security becomes a challenging process that can be miti-gated by the utilization of cryptography and steganography techniques. Earlier studies on steganog-raphy have the risk of exposing confidential data by an anonymous user. For resolving, the limitations related to the existing algorithms, one of the efficient solutions in encryption-based steganography. Encryption techniques act as an important part in protect actual data from illegal access. This study focuses on the design of Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) based image steganography technique. The presented BESOPS-CE tech-nique effectively hides the secret image in its encrypted version to the cover image. For accomplish-ing this, the BESOPS-CE technique employs a BES for optimal pixel selection (OPS) procedure. Besides, chaotic encryption was executed for encrypting the secret image, which is then embedded to choose pixel points of the cover image. Finally, embedding and extraction processes are carried out. The inclusion of the encryption process aids in accomplishing an added layer of security. A comprehensive simulation study was used to report on the BESOPS-CE approach's increased per-formance, and the results are examined from many angles. A thorough comparative analysis revealed that the BESOPS-CE model outperformed more contemporary methods.& COPY; THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:41 / 54
页数:14
相关论文
共 50 条
  • [31] Breaking an image encryption technique based on neural chaotic generator
    Norouzi, Benyamin
    Mirzakuchaki, Sattar
    Norouzi, Peyman
    OPTIK, 2017, 140 : 946 - 952
  • [32] A Two Layer Chaotic Network Based Image Encryption Technique
    Jain, Anchal
    Rajpal, Navin
    2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS (NCCCS), 2012, : 182 - 186
  • [33] A Novel Image Steganography Technique Using AES Encryption in DCT Domain
    Sahu, Aman
    Pradhan, Chittaranjan
    DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 349 - 354
  • [34] Stochastic Local Search Combined with LSB Technique for Image Steganography
    Boughaci, Dalila v
    Kemouche, Abdelhafid
    Lachibi, Hocine
    2016 13TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), 2016, : 36 - 44
  • [35] An efficient pixel-level chaotic image encryption algorithm
    Guodong Ye
    Chen Pan
    Xiaoling Huang
    Qixiang Mei
    Nonlinear Dynamics, 2018, 94 : 745 - 756
  • [36] An efficient pixel-level chaotic image encryption algorithm
    Ye, Guodong
    Pan, Chen
    Huang, Xiaoling
    Mei, Qixiang
    NONLINEAR DYNAMICS, 2018, 94 (01) : 745 - 756
  • [37] Cover Image Selection Technique for Secured LSB-based Image Steganography
    Molato, Mark Rennel D.
    Gerardo, Bobby D.
    2018 INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND ARTIFICIAL INTELLIGENCE (ACAI 2018), 2018,
  • [38] A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map Image Encryption Using Combined Chaotic Map
    Parvees, M. Y. Mohamed
    Samath, J. Abdul
    Raj, I. Kaspar
    Bose, B. Parameswaran
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1067 - 1072
  • [39] Cryptanalzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and DNA-Level Diffusion
    Feng, Wei
    Zhang, Jing
    IEEE ACCESS, 2020, 8 : 209471 - 209482
  • [40] An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method
    Sajasi, Sara
    Moghadam, Amir-Masoud Eftekhari
    APPLIED SOFT COMPUTING, 2015, 30 : 375 - 389