Skip to main content

A Reliable Transmission and Extraction of Textual Information Using Keyless Encryption, Steganography, and Deep Algorithm with Cuckoo Optimization

  • Conference paper
  • First Online:
Micro-Electronics and Telecommunication Engineering

Abstract

The entire work postulates a fusion of an innovative keyless image encoding approach based on a chaotic map and steganography. Nearly every single picture element has been encrypted by rearranging pixel values that are then assessed by such an adapted cat map as well as steganography has been used in the suggested methodology to transmit keyless encoded textual information utilizing a cover image, with encoded textual image information inserted into cover images. But on the other hand, retrieving textual images embedded in the receiver has indeed been regarded as the most challenging process. Furthermore, a sender will indeed transfer reasoning rather than a key to the recipient, ignoring the fact that acquiring engrained textual information hidden inside the cover image to enhance efficiency would have been challenging. Steganography was easily accomplished by placing data bits of secret textual image information into the cover image’s least significant bit of picture elements. The image quality, on the other hand, suffers greatly from the inclusion of an encrypted message. Images could indeed cause some disturbances from time to time. As a consequence, non-smooth areas of the image have been regarded as smooth. Therefore, the weighted Naive Bayes algorithm (NBA) method is being used in the illustration to retrieve the appropriate textual image information from complicated deteriorated images. Normally, images comprise a small amount of noise, so the introduction of the guided filter (GF) during the initial preprocessing phase is required. A very important feature in the textual image information extraction procedure was obtained utilizing a variety of techniques, including Gabor transform (GT), weighted Naive Bayes algorithms (WNBA), and a high-quality learning procedure for standard procedure. Eventually, textual content identification and recognition are performed using a combination of DNN and cuckoo algorithms. Again, for the proposed system, the set of data IIIT5K is being used, as well as high performance has been gained with parameters such as mean square error and peak signal-to-noise ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pandey, D., Pandey, B. K., et al. (2020). Analysis of text detection, extraction and recognition from complex degraded images and videos. Journal of Critical Reviews, 7(18), 427–433.

    Google Scholar 

  2. Chong, F., Bian, O., Jiang, H.-Y., Ge, L-H., & M, H.-F. (2016). A New Chaos-Based Image Cipher Using a Hash Function IEEE/ACIS 15th International Conference on Computer and Information Science(ICIS).

    Google Scholar 

  3. Pandey, D., Pandey, B. K., & Wariya, S. (2020). An approach to text extraction from complex degraded scene. IJCBS, 1(2), 4–10.

    Google Scholar 

  4. Pandey, D., Pandey, B. K., & Wariya, S. (2019). Study of various types noise and text extraction algorithms for degraded complex image. Journal of Emerging Technologies and Innovative Research, 6(6), 234–247.

    Google Scholar 

  5. Pandey, B. K., Pandey, D., & Pandey, S. (2011). Survey of bioinformatics applications on parallel architectures. International Journal of Computer Applications, 23(4), 21–25.

    Article  Google Scholar 

  6. Obaid, A. J., Chatterjee, T., & Bhattacharya, A. (2020). Semantic web and web page clustering algorithms: A landscape view. EAI Endorsed Transactions on Energy Web, 8(33).

    Google Scholar 

  7. Kumar Pandey, B., Pandey, D., Nassa, V. K., Ahmad, T., Singh, C., George, A. S., & Wakchaure, M. A. (2022). Encryption and steganography-based text extraction in IoT using the EWCTS optimizer. The Imaging Science Journal, 1–19.

    Google Scholar 

  8. Pandey, B. K., Pandey, D., Wairya, S., Agarwal, G., Dadeech, P., Dogiwal, S. R., & Pramanik, S. (2022). Application of integrated steganography and image compressing techniques for confidential information transmission. Cyber Security and Network Security, 169–191.

    Google Scholar 

  9. Pandey, B. K., Pandey, D., & Agarwal, A. (2022). Encrypted information transmission by enhanced steganography and image transformation. International Journal of Distributed Artificial Intelligence (IJDAI), 14(1), 1–14.

    Google Scholar 

  10. Pandey, B. K., Pandey, D., Gupta, A., Nassa, V. K., Dadheech, P., & George, A. S. (2023). Secret data transmission using advanced morphological component analysis and steganography. In Role of Data-Intensive Distributed Computing Systems in Designing Data Solutions (pp. 21–44). Cham: Springer International Publishing.

    Google Scholar 

  11. Pandey, D., & Pandey, B. K. (2022). An efficient deep neural network with adaptive galactic swarm optimization for complex image text extraction. In Process Mining Techniques for Pattern Recognition (pp. 121–137). CRC Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binay Kumar Pandey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pandey, B.K., Pandey, D., Alkhafaji, M.A., Güneşer, M.T., Şeker, C. (2023). A Reliable Transmission and Extraction of Textual Information Using Keyless Encryption, Steganography, and Deep Algorithm with Cuckoo Optimization. In: Sharma, D.K., Peng, SL., Sharma, R., Jeon, G. (eds) Micro-Electronics and Telecommunication Engineering . Lecture Notes in Networks and Systems, vol 617. Springer, Singapore. https://doi.org/10.1007/978-981-19-9512-5_57

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9512-5_57

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9511-8

  • Online ISBN: 978-981-19-9512-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics