14
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling

, &

References

  • Bender, Walter, et al. “Techniques for data hiding.” IBM systems journal 35.3.4 (1996): 313-336. doi: 10.1147/sj.353.0313
  • Lakshmi Sirisha, B., and B. Chandra Mohan. “Review on spatial domain image steganography techniques.” Journal of Discrete Mathematical Sciences and Cryptography 24.6 (2021): 1873-1883. doi: 10.1080/09720529.2021.1962025
  • Ayub, Nadish, and Arvind Selwal. “An improved image steganography technique using edge based data hiding in DCT domain.” Journal of Interdisciplinary Mathematics 23.2 (2020): 357-366. doi: 10.1080/09720502.2020.1731949
  • Chan, Chi-Kwong, and Lee-Ming Cheng. “Hiding data in images by simple LSB substitution.” Pattern recognition 37.3 (2004): 469-474. doi: 10.1016/j.patcog.2003.08.007
  • Ortega, Antonio, et al. “Graph signal processing: Overview, challenges, and applications.” Proceedings of the IEEE 106.5 (2018): 808-828. doi: 10.1109/JPROC.2018.2820126
  • Kaur, Satnam, et al. “Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization.” Engineering Applications of Artificial Intelligence 90 (2020): 103541. doi: 10.1016/j.engappai.2020.103541
  • Jaradat, Aya, Eyad Taqieddin, and Moad Mowafi. “A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization.” Security and Communication Networks 2021 (2021).
  • Sharma, Monisha, M. K. Kowar, and Manisha Sharma. “An improved evolutionary algorithm for secured image using adaptive genetic algorithm.” Journal of Discrete Mathematical Sciences and Cryptography 11.6 (2008): 673-683. doi: 10.1080/09720529.2008.10698397
  • Sahu, Aditya Kumar, and Gandharba Swain. “Pixel overlapping image steganography using PVD and modulus function.” 3D Research 9.3 (2018): 1–14. doi: 10.1007/s13319-018-0188-5
  • Wazirali, Ranyiah, et al. “An optimized steganography hiding capacity and imperceptibly using genetic algorithms.” IEEE Access 7 (2019): 133496-133508. doi: 10.1109/ACCESS.2019.2941440
  • Nipanikar, S. I., V. Hima Deepthi, and Nikita Kulkarni. “A sparse representation based image steganography using particle swarm optimization and wavelet transform.” Alexandria engineering journal 57.4 (2018): 2343-2356. doi: 10.1016/j.aej.2017.09.005
  • Wang, Shen, Bian Yang, and Xiamu Niu. “A secure steganography method based on genetic algorithm.” J. Inf. Hiding Multim. Signal Process. 1.1 (2010): 28-35.
  • Mohsin, Ali H., et al. “New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity.” IEEE Access 7 (2019): 168994-169010. doi: 10.1109/ACCESS.2019.2949622
  • Li, Xiaoxia, and Jianjun Wang. “A steganographic method based upon JPEG and particle swarm optimization algorithm.” Information Sciences 177.15 (2007): 3099-3109. doi: 10.1016/j.ins.2007.02.008
  • Amsaveni, A., and C. Arunkumar. “An efficient data hiding scheme using firefly algorithm in spatial domain.” 2015 2nd International Conference on Electronics and Communication Systems (ICECS). IEEE, 2015.
  • Sharma, Vijay Kumar, Devesh Kumar Srivastava, and Pratistha Mathur. “Efficient image steganography using graph signal processing.” IET Image Processing 12.6 (2018): 1065-1071. doi: 10.1049/iet-ipr.2017.0965
  • Jaradat, Aya, Eyad Taqieddin, and Moad Mowafi. “A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization.” Security and Communication Networks 2021 (2021).
  • Yoshida, T., H. Mori, and H. Shigematsu. “Analytic study of chaos of the tent map: band structures, power spectra, and critical behaviors.” Journal of statistical physics 31.2 (1983): 279-308. doi: 10.1007/BF01011583
  • Ding, Ke, and Xing Xu. “Chaotic synchronization of modified discrete-time Tinkerbell systems.” Discrete Dynamics in Nature and Society 2016 (2016).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.