Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

被引:7
|
作者
Bahaddad, Adel A. [1 ]
Almarhabi, Khalid Ali [2 ]
Abdel-Khalek, Sayed [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp Al Qunfudah, Dept Comp Sci, Mecca, Saudi Arabia
[3] Sohag Univ, Fac Sci, Dept Math, Sohag 82524, Egypt
关键词
Image Steganography; Encryption; Bald Eagle Search; Optimization Algorithm; Security; Pixel Selection; SEMI-TENSOR PRODUCT; ALGORITHM;
D O I
10.1016/j.aej.2023.05.051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the digital era, information security becomes a challenging process that can be miti-gated by the utilization of cryptography and steganography techniques. Earlier studies on steganog-raphy have the risk of exposing confidential data by an anonymous user. For resolving, the limitations related to the existing algorithms, one of the efficient solutions in encryption-based steganography. Encryption techniques act as an important part in protect actual data from illegal access. This study focuses on the design of Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) based image steganography technique. The presented BESOPS-CE tech-nique effectively hides the secret image in its encrypted version to the cover image. For accomplish-ing this, the BESOPS-CE technique employs a BES for optimal pixel selection (OPS) procedure. Besides, chaotic encryption was executed for encrypting the secret image, which is then embedded to choose pixel points of the cover image. Finally, embedding and extraction processes are carried out. The inclusion of the encryption process aids in accomplishing an added layer of security. A comprehensive simulation study was used to report on the BESOPS-CE approach's increased per-formance, and the results are examined from many angles. A thorough comparative analysis revealed that the BESOPS-CE model outperformed more contemporary methods.& COPY; THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:41 / 54
页数:14
相关论文
共 50 条
  • [41] Chaos cryptosystem with optimal key selection for image encryption
    Khaitan, Supriya
    Sagar, Shrddha
    Agarwal, Rashi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (25) : 39653 - 39668
  • [42] Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
    Al Duhayyim M.
    Alrayes F.S.
    Alotaibi S.S.
    Alazwari S.
    Allheeib N.
    Yafoz A.
    Alsini R.
    Aziz A.S.A.
    Computer Systems Science and Engineering, 2023, 46 (03): : 3109 - 3223
  • [43] A Novel Security Technique Based on Controlled Pixel Based Encryption of Image Blocks for Sharing a Secret Image
    Rathore, Neeraj Kumar
    Pandey, Dhiraj
    Doewes, Rumi Iqbal
    Bhatt, Abhishek
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (01) : 191 - 207
  • [44] Image Encryption Based on Chaotic Sub-Block Scrambling and Chaotic Digit Selection Diffusion
    Xian, Yongjin
    Wang, Xingyuan
    Yan, Xiaopeng
    Li, Qi
    Wang, Xiaoyu
    OPTICS AND LASERS IN ENGINEERING, 2020, 134
  • [45] A Novel Plaintext-Related Image Encryption Scheme Based on Chaotic System and Pixel Permutation
    Niu, Ying
    Zhang, Xuncai
    IEEE ACCESS, 2020, 8 : 22082 - 22093
  • [46] Image encryption process based on chaotic synchronization phenomena
    Volos, Ch. K.
    Kyprianidis, I. M.
    Stouboulos, I. N.
    SIGNAL PROCESSING, 2013, 93 (05) : 1328 - 1340
  • [47] A Novel Approach: Pixel Matching Based Image Steganography
    Shelke, S. G.
    Jagtap, S. K.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [48] Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion
    Shahna, K. U.
    Mohamed, Anuj
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 99
  • [49] A secure image steganography based on LSB technique and 2D chaotic maps
    Khalil, Noura
    Sarhan, Amany
    Alshewimy, Mahmoud A. M.
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [50] Image encryption based on highly sensitive chaotic system
    Ali, Dalia S.
    Alwan, Nawras A.
    Al-Saidi, Nadia M. G.
    THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019), 2019, 2183