115
Views
12
CrossRef citations to date
0
Altmetric
Articles

Encryption-based steganography of images by multiobjective whale optimal pixel selection

, &
Pages 1140-1149 | Received 23 Jul 2019, Accepted 06 Nov 2019, Published online: 21 Nov 2019

References

  • Ghosal SK, Mandal JK. On the use of the Stirling transform in image steganography. J Inf Security Appl. 2019;46:320–330.
  • Muhammad K, Sajjad M, Mehmood I, et al. Image steganography using uncorrelated colour space and its application for security of visual contents in online social networks. Future Gener Comput Syst. 2018;86:951–960. doi: 10.1016/j.future.2016.11.029
  • Pandey P, Tiwari P, Mishra S, et al. A stegnography project-data hiding in encrypted image. J Network Commun Em Tech (JNCET). 2016;6(4). Available from: www.jncet.org.
  • Kadhim IJ, Premaratne P, Vial PJ, et al. Comprehensive survey of image steganography: techniques, Evaluations, and trends in future research. Neurocomputing. 2019;335:299–326. doi: 10.1016/j.neucom.2018.06.075
  • Jain M, Kumar A. RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int J Machine Learning Cybernetics. 2017;8(5):1695–1705. doi: 10.1007/s13042-016-0542-y
  • Hussain M, Wahab AWA, Idris YIB, et al. image steganography in spatial domain: a survey. Signal Process Image Commun. 2018;65:46–66. doi: 10.1016/j.image.2018.03.012
  • Teja JD, Rao ACS, Dara S. A new image steganography technique for hiding the data in multi layers of the PNG images. Int J Ad Hoc Ubiquitous Comput. 2017;2(7):104–112.
  • Kiran S, Reddy RPK, Subramanyan N. A novel high capacity data embedding image steganography using spiral scan. International Journal of Engineering Technology Science and Research. 2017;4(12):1363–1371.
  • Usha BA, Ksrinath N, Ravikumar CN, et al. Cognitive prediction of the most appropriate image steganography approach. Int J Comput Appl. 2015;121(8):42–45.
  • Tukiwala AF, Degadwala SD. Data hiding in image using multilevel 2-D DWT and ASCII conversion and cyclic mathematical function-based cryptography. Int J Comput Appl. 2014;105(7):19–25.
  • Thanki R, Borra S. A colour image steganography in hybrid FRT–DWT domain. J Inf Security Appl. 2018;40:92–102.
  • Zhou Z, Yang C-N, Cao Y, et al. Secret image sharing based on encrypted pixels. IEEE Access. 2018;6:15021–15025. doi: 10.1109/ACCESS.2018.2811722
  • Kaur A, Kaur B. Exploring the techniques of data embedding in images: a review. Int J Comput Appl. 2015;122(3):18–21.
  • Atee HA, Ahmad R, Noor NM, et al. Extreme learning machine based optimal embedding location finder for image steganography. PloS One. 2017;12(2):e0170329. doi: 10.1371/journal.pone.0170329
  • Douglas M, Bailey K, Leeney M, et al. An overview of steganography techniques applied to the protection of biometric data. Multimed Tools Appl. 2018;77(13):17333–17373. doi: 10.1007/s11042-017-5308-3
  • Duan X, Song H, Qin C, et al. Coverless steganography for digital images based on a generative model. Comput Mater Continua. 2018;55(3):483–493.
  • Priyanka BG, Sathyanarayana SV. A steganographic system for embedding image and the encrypted text. In 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, India. IEEE, 2014, p. 1351–1355..
  • Rajput SS, Bohat VK, Arya KV. Grey wolf optimization algorithm for facial image super-resolution. Appl Int. 2019;49(4):1324–1338. doi: 10.1007/s10489-018-1340-x
  • Daniel E, et al. Optimum spectrum mask based medical image fusion using gray wolf optimization. Biomed Signal Process Control. 2017;34:36–43. doi: 10.1016/j.bspc.2017.01.003
  • Nipanikar SI, Deepthi VH, Kulkarni N. A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform. Alexandria Eng J. 2017;77:26135–26172.
  • Mirjalili S, Lewis A. The whale optimization algorithm. Adv Eng Softw. 2016;95:51–67. doi: 10.1016/j.advengsoft.2016.01.008
  • Aziz E, Abd M, Ewees AA, et al. Multi-objective whale optimization algorithm for content-based image retrieval. Multimed Tools Appl. 2018;53:1–38.
  • Adhie RP, Hutama Y, Saleh Ahmar A, et al. Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). In J Phys Conf Ser. 2018;954(1):012009.
  • Shan W, Zhang S, He Y. Machine learning-based side-channel-attack countermeasure with hamming-distance redistribution and its application on advanced encryption standard. Electron Lett. 2017;53(14):926–928. doi: 10.1049/el.2017.1460
  • Tanwar S, Kumar A. Extended identity-based multi-signcryption scheme with public verifiability. J Inf Opt Sci. 2018;39(2):503–517.
  • Virupakshappa, Amarapur B. Computer-aided diagnosis applied to MRI images of brain tumor using cognition based modified level set and optimized ANN classifier. Multimed Tools Appl. 2018. DOI:10.1007/s11042-018-6176-1.
  • Veerashetty S, Patil N. Novel LBP based texture descriptor for rotation, illumination and scale invariance for image texture analysis and classification using multi-kernel SVM. Multimed Tools Appl. 2019. DOI:10.1007/s11042-019-7345-6.
  • Virupakshappa, Amarapur B. Cognition-based MRI brain tumor segmentation technique using modified level set method. Cogn Technol Work. 2019;21(3):357–369. DOI:10.1007/s10111-018-0472-4.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.