Mohan Bhandari, Subash Panday, Chandra Prakash Bhatta, S. Panday
{"title":"基于三角混沌映射蚁群优化的图像隐写方法","authors":"Mohan Bhandari, Subash Panday, Chandra Prakash Bhatta, S. Panday","doi":"10.1109/iciptm54933.2022.9753917","DOIUrl":null,"url":null,"abstract":"To establish the secure communication using image steganography by hiding the information in cover image, the study focus on image steganography based on Ant Colony Optimization (ACO) where the cover image is divided into number of 5×5 blocks. As pixel values after ACO are considered as the optimal pixels, the ants search the next qualified pixels on reference to pheromone trails to encode the text messages. After ACO, Triangular Chaotic Map (TCM) is imposed based on initial value of chaotic sequences. The proposed method outperformed other state-of-art methods like classical Least Significant Bit(LSB), LSB with ACO, LSB with logistic map for all the images under consideration: lenna.png (0.00046, 83.4021, 0.0007, 0.9990964, 0.9983), baboon.png (0.00027, 82.5526, 0.0009, 0.9990542, 0.9985), pepper.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947), dog.png (0.00045, 70.4590, 0.0005, 0.9990024, 0.9904) and flower.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947) under the evaluation metrics as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Mean Absolute Error (MAE), F-Score and Structural Similarity Index Matrix (SSIM) respectively.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"23 1","pages":"429-434"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Image Steganography Approach Based Ant Colony Optimization with Triangular Chaotic Map\",\"authors\":\"Mohan Bhandari, Subash Panday, Chandra Prakash Bhatta, S. Panday\",\"doi\":\"10.1109/iciptm54933.2022.9753917\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To establish the secure communication using image steganography by hiding the information in cover image, the study focus on image steganography based on Ant Colony Optimization (ACO) where the cover image is divided into number of 5×5 blocks. As pixel values after ACO are considered as the optimal pixels, the ants search the next qualified pixels on reference to pheromone trails to encode the text messages. After ACO, Triangular Chaotic Map (TCM) is imposed based on initial value of chaotic sequences. The proposed method outperformed other state-of-art methods like classical Least Significant Bit(LSB), LSB with ACO, LSB with logistic map for all the images under consideration: lenna.png (0.00046, 83.4021, 0.0007, 0.9990964, 0.9983), baboon.png (0.00027, 82.5526, 0.0009, 0.9990542, 0.9985), pepper.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947), dog.png (0.00045, 70.4590, 0.0005, 0.9990024, 0.9904) and flower.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947) under the evaluation metrics as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Mean Absolute Error (MAE), F-Score and Structural Similarity Index Matrix (SSIM) respectively.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"23 1\",\"pages\":\"429-434\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9753917\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9753917","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Steganography Approach Based Ant Colony Optimization with Triangular Chaotic Map
To establish the secure communication using image steganography by hiding the information in cover image, the study focus on image steganography based on Ant Colony Optimization (ACO) where the cover image is divided into number of 5×5 blocks. As pixel values after ACO are considered as the optimal pixels, the ants search the next qualified pixels on reference to pheromone trails to encode the text messages. After ACO, Triangular Chaotic Map (TCM) is imposed based on initial value of chaotic sequences. The proposed method outperformed other state-of-art methods like classical Least Significant Bit(LSB), LSB with ACO, LSB with logistic map for all the images under consideration: lenna.png (0.00046, 83.4021, 0.0007, 0.9990964, 0.9983), baboon.png (0.00027, 82.5526, 0.0009, 0.9990542, 0.9985), pepper.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947), dog.png (0.00045, 70.4590, 0.0005, 0.9990024, 0.9904) and flower.png (0.00067, 71.2322, 0.0004, 0.9990560, 0.9947) under the evaluation metrics as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Mean Absolute Error (MAE), F-Score and Structural Similarity Index Matrix (SSIM) respectively.