Affiliation:
1. Computer Science and Engineering, Kongunadu College of Engineering and Technology, Thottiam, Trichy
2. Electronics and Communication Engineering, Kongunadu College of Engineering and Technology, Thottiam, Trichy
Abstract
To safeguard private information, image steganography is extensively used. Research is focused on ways to enhance steganographic technologies so that they may increase compression ratio while maintaining steganography image integrity. Because of its essential qualities such as security, scalability, and robustness, Steganography is a preferred way of communicating protected secret information to prevent hacking and misuse. This proposed research offers a steganography approach based on Enhanced Chaotic Particle Swarm Optimization (ECPSO), which uses chaos theory to determine the optimal pixel positions in the cover picture to hide confidential information when keeping the steganography quality in the images. Both the cover and secret pictures are separated into blocks to increase hiding capacity, with each component storing a sufficient quantity of secret data by mapping the pixels. The suggested ECPSO-Stegano system has better results with the criteria of Mean Square Error (MSE) of 0.00018%, Peak-Signal-to-Noise-Ratio (PSNR) of 79.66%, Bit Error Rate (BER) of 0.45% in average, and Structural Similarity Index (SSI) of 0.98 in average for various input size. It’s also robust to statistical threats.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference30 articles.
1. Impact of data privacy and confidentiality on developing telemedicine applications: a review participates opinion and expert concerns;Zaidan;International Journal of Pharmacology,2011
2. Steganography in images using lsb technique;Singh;International Journal of LatestTrends in Engineering and Technology (IJLTET),2015
3. Image steganography in spatial domain: a survey;Hussain;Signal Processing: Image Communication,2018
4. On the differences between hiding information and cryptography techniques: an overview;Zaidan;Journal of Applied Sciences,2010
5. Comprehensive survey of image steganography: techniques, evaluations, and trends in future research;Kadhim;Neurocomputing,2019