{"title":"Enhanced Whale Optimization Algorithm and Wavelet Transform for Image Steganography","authors":"","doi":"10.46253/j.mr.v2i3.a3","DOIUrl":null,"url":null,"abstract":": In the interactive environment, information security is considered as the main issue with the development of information technology. Here, there is no protection for the messages transmitted to and from the receiver. A method called image steganography is used, which assures security to the concealed communication and protection of the information. In some of the receiver images, image steganography conceals the secret message and transmits the secret message so that the message is noticeable only to the transmitter and the receiver. Hence, this paper presents an algorithm for image steganography by exploiting sparse representation, and a method called Enhanced Whale Optimization Algorithm (WOA) in order to effectual selection of the pixels in order to embed the secret audio signal in the image. Enhanced WOA based pixel chosen process exploits a fitness function that is on the basis of the cost function. In order to evaluate the fitness, cost function computes the entropy, edge, and pixel intensity. Experimentation has been performed and a comparison of the proposed algorithm with the conventional algorithms regarding the PSNR and MSE. Moreover, it decides the proposed Enhanced WOA, as an effectual algorithm. to resolve the aforesaid issues, a (k, n) threshold partial reversible Absolute Moment Block Truncation Coding (AMBTC) on the basis of the SIS model with authentication and steganography was developed. Using the polynomial on the basis of the SIS in GF (28), a secret image was partition into n noise-similar to shares. They were hidden into the AMBTC cover image with parity bits using the developed embedding methods, and n meaningful stego images were modeled in order to competently deal with the shares. Authentication was used as a result that the reliability of stego image was confirmed. Adequate stego images can completely restructure the secret.","PeriodicalId":167187,"journal":{"name":"Multimedia Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Multimedia Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46253/j.mr.v2i3.a3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21
Abstract
: In the interactive environment, information security is considered as the main issue with the development of information technology. Here, there is no protection for the messages transmitted to and from the receiver. A method called image steganography is used, which assures security to the concealed communication and protection of the information. In some of the receiver images, image steganography conceals the secret message and transmits the secret message so that the message is noticeable only to the transmitter and the receiver. Hence, this paper presents an algorithm for image steganography by exploiting sparse representation, and a method called Enhanced Whale Optimization Algorithm (WOA) in order to effectual selection of the pixels in order to embed the secret audio signal in the image. Enhanced WOA based pixel chosen process exploits a fitness function that is on the basis of the cost function. In order to evaluate the fitness, cost function computes the entropy, edge, and pixel intensity. Experimentation has been performed and a comparison of the proposed algorithm with the conventional algorithms regarding the PSNR and MSE. Moreover, it decides the proposed Enhanced WOA, as an effectual algorithm. to resolve the aforesaid issues, a (k, n) threshold partial reversible Absolute Moment Block Truncation Coding (AMBTC) on the basis of the SIS model with authentication and steganography was developed. Using the polynomial on the basis of the SIS in GF (28), a secret image was partition into n noise-similar to shares. They were hidden into the AMBTC cover image with parity bits using the developed embedding methods, and n meaningful stego images were modeled in order to competently deal with the shares. Authentication was used as a result that the reliability of stego image was confirmed. Adequate stego images can completely restructure the secret.