Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption

被引:4
|
作者
Bahaddad, Adel A. [1 ]
Almarhabi, Khalid Ali [2 ]
Abdel-Khalek, Sayed [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Coll Comp Al Qunfudah, Dept Comp Sci, Mecca, Saudi Arabia
[3] Sohag Univ, Fac Sci, Dept Math, Sohag 82524, Egypt
关键词
Image Steganography; Encryption; Bald Eagle Search; Optimization Algorithm; Security; Pixel Selection; SEMI-TENSOR PRODUCT; ALGORITHM;
D O I
10.1016/j.aej.2023.05.051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the digital era, information security becomes a challenging process that can be miti-gated by the utilization of cryptography and steganography techniques. Earlier studies on steganog-raphy have the risk of exposing confidential data by an anonymous user. For resolving, the limitations related to the existing algorithms, one of the efficient solutions in encryption-based steganography. Encryption techniques act as an important part in protect actual data from illegal access. This study focuses on the design of Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) based image steganography technique. The presented BESOPS-CE tech-nique effectively hides the secret image in its encrypted version to the cover image. For accomplish-ing this, the BESOPS-CE technique employs a BES for optimal pixel selection (OPS) procedure. Besides, chaotic encryption was executed for encrypting the secret image, which is then embedded to choose pixel points of the cover image. Finally, embedding and extraction processes are carried out. The inclusion of the encryption process aids in accomplishing an added layer of security. A comprehensive simulation study was used to report on the BESOPS-CE approach's increased per-formance, and the results are examined from many angles. A thorough comparative analysis revealed that the BESOPS-CE model outperformed more contemporary methods.& COPY; THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:41 / 54
页数:14
相关论文
共 50 条
  • [41] Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption
    Dash, Shreela
    Das, M. N.
    Das, Mamatarani
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 535 - 544
  • [42] An image encryption algorithm based on pixel bit operation and nonlinear chaotic system
    Wang, Xingyuan
    Chen, Shengnan
    VISUAL COMPUTER, 2023, 39 (07): : 3123 - 3144
  • [43] Chaotic map based random image steganography using LSB technique
    Rajendran S.
    Doraipandian M.
    International Journal of Network Security, 2017, 19 (04) : 593 - 598
  • [44] Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
    Verma, Om Prakash
    Nizam, Munazza
    Ahmed, Musheer
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2013, 9 (02): : 271 - 286
  • [45] A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography
    Liu, Jinyuan
    Wang, Yong
    Han, Qi
    Gao, Jerry
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2022, 32 (01):
  • [46] RESEARCH ON ECONOMIC OPTIMAL DISPATCHING OF MICROGRID CLUSTERS BASED ON IMPROvED BALD EAGLE SEARCH ALGORITHM
    Zhou H.
    Zhang Y.
    Xiao L.
    Zhao G.
    Taiyangneng Xuebao/Acta Energiae Solaris Sinica, 2024, 45 (02): : 328 - 335
  • [47] Breaking an image encryption technique based on neural chaotic generator
    Norouzi, Benyamin
    Mirzakuchaki, Sattar
    Norouzi, Peyman
    OPTIK, 2017, 140 : 946 - 952
  • [48] Image Encryption Technique Based on Chaotic System and Hash Function
    Mishra, Manish
    Pandit, Shraddha
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND SYSTEMS (ICCCS'14), 2014, : 63 - 67
  • [49] A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography
    M N Sharath
    T M Rajesh
    Mallanagouda Patil
    Multimedia Tools and Applications, 2023, 82 : 25197 - 25216
  • [50] Adaptive Partial Image Encryption Technique based on Chaotic Map
    Mandal, J. K.
    Saha, Mandrita
    Mandal, Pragati
    Sengupta, Madhumita
    Pal, Tandra
    Bhowmik, Mrinal Kanti
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 328 - 334