Abstract
In this digital era, an unprecedented volume of data theft and other criminal activities have rapidly increased on communication systems over wireless channels. To protect the data, various methods have been carried out over the past decade. Data hiding combined with steganography and cryptography is one of the solutions to address the data theft issue. Steganography is used to embed data inside any carrier image file, whereas cryptography is used to maintain the private information in a secure manner. In this paper, the cryptographic algorithm Rivest, Shamir & Adelman (RSA) and Elliptical Curve Cryptography (ECC) are used in cohesion with the data embedding technique. Also, this compares the performance of the encryption algorithms with the hiding technique. Here, the encrypted data is hidden inside the selected location using the Fruit fly Optimization hybridized Improved Seeker (FOIS) algorithm. After finding the optimization pixels, the difference is calculated between the optimization pixels and nearest pixels using Pixel Value Differencing (PVD) to enhance the performance. This work presents the usage of the proposed algorithm based on the evidence from the comparative analysis and threat simulation.
Similar content being viewed by others
References
Neil FJ, Sushil J (1998) Exploring steganography seeing the unseen. IEEE Comput Soc 31(2):26–34. https://doi.org/10.1109/MC.1998.4655281
Kanan HR, Nazeri B, Quot (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm & quot. Expert Syst Appl 41(14):6123–6130. https://doi.org/10.1016/j.eswa.2014.04.022
Sameh AA, Taha IBA, Fayed FMG, Sohier MK, Quot (2015) Optimized video steganography using Cuckoo Search algorithm. In: Intelligent Computing and Information Systems (ICICIS) IEEE Seventh International Conference, pp 572–577. https://doi.org/10.1109/INTELCIS.2015.7397279.
Yang X-S, Deb S (2009) Cuckoo search via Levy flights. In: Proc. of World Congress on Nature & Biologically Inspired Computing (NaBIC 2009). IEEE Publications, pp 210–214. https://doi.org/10.1109/NABIC.2009.5393690
Hongqing Z, Yongquan Z (2012) A novel cuckoo search optimization algorithm base on gauss distribution. J Comput Inf Syst 8(10):4193–4200
Xiaoxia L, Jianjun W (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177(15): 3099-3109 https://doi.org/10.1016/j.ins.2007.02.008
Chang C-C, Chen T-S, Chung L-Z (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1–2):123–138. https://doi.org/10.1016/S0020-0255(01)00194-3
Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39(2):640–654. https://doi.org/10.1016/j.compeleceng.2012.12.021
Ghasemi E, Shanbehzadeh J, Fassihi N (2012) High capacity image steganography based on genetic algorithm and wavelet transform, intelligent control and innovative computing. Lecture Notes Electr Eng. https://doi.org/10.1007/978-1-4614-1695-1_30
Naitik PK, Dipesh GK, Dharmesh NK. Performance evaluation of lsb based steganography for optimization of PSNR and MSE. J Inf Knowl Res Electron Commun Eng 2 (2): 505–509
Rivest S, Adleman A (1978) Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, pp 120- 126. https://doi.org/10.1145/359340.359342
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209
Ronald P, Haff Eric Jackson S, Moscetti R, Massantini R (2015) Detection of fruit-fly infestation in olives using X-Ray imaging: Algorithm development and prospects. Columbia Int Publ Am J Agric Sci Technol 4(1):1–8. https://doi.org/10.7726/ajast.2016.1001
Chaohua Dai, Weirong Chen, Yunfang Zhu and Xuexia Zhang, (2009) Seeker Optimization Algorithm for OptimalReactive Power Dispatch, IEEE Transactions on Power Systems, 24 (3):1218–1231. https://doi.org/10.1109/TPWRS.2009.2021226.
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008
Carvalho D, Lima R, Silva WGD, Morais AHO (2017) Optimizing image steganography using particle Swarm optimization algorithm. Int J Comput Appl 164(7):1–5. https://doi.org/10.5120/ijca2017913686
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61. https://doi.org/10.1016/j.advengsoft.2013.12.007
Weber AG (1997) The USC-SIPI Image Database: Version 5, Original release: Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering, ed.
Sree ST, Ramar K, SreeRenga RT (2013) Impact of Applying preprocessing Techniques for Improving Classification Accuracy, Signal Image and Video Processing, Springer-Verlag London Limited 8 (1):149-157. https://doi.org/10.1007/s11760-013-0505-7
Sree ST, Ramar K, SreeRenga RT (2013) Comparative analysis of satellite image preprocessing techniques. J Comput Sci 9(2):176–182 https://doi.org/10.3844/jcssp.2013.176.182
Sree ST, Ramar K, SreeRenga RT (2013) Developing an efficient technique for satellite image denoising and resolution enhancement for improving classification accuracy. J Electron Imaging. https://doi.org/10.1117/1.JEI.22.1.013013
Sree ST, Ramar K Efficient Analysis of Hybrid Directional Lifting Technique for Satellite Image Denoising, Signal Image and Video Processing, Springer-Verlag London Limited 8 (7): 1399–1404. https://doi.org/10.1007/s11760-012-0369-2.
Roselin Kiruba R, Sree Sharmila T (2021) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multidim Syst Sign Proacess 32:405–430. https://doi.org/10.1007/s11045-019-00697-w
RoselinKiruba R, Sharmila TS (2018) Hiding Data in Videos Using Optimal Selection of Key-Frames. International Conference on Computer, Communication, and Signal Processing (ICCCSP), pp 1–6. https://doi.org/10.1109/ICCCSP.2018.8452834.
RoselinKiruba R, Sharmila TS (2017) Performance analysis in secured image encryption and data hiding using LSB algorithm, IEEE International Conference on Circuits and Systems (ICCS), pp112–117. https://doi.org/10.1109/ICCS1.2017.8325974.
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. Multimedia, IEEE 8(4):22–28. https://doi.org/10.1109/93.959097
SteveBaker RCD (1984) Clarification of the use of Chi-square and likelihood functions in fits to histograms. Nucl Instrum Methods Phys Res 221(2):437–442. https://doi.org/10.1016/0167-5087(84)90016-4
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Roselinkiruba, R., Sharmila, T.S. Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm. Int. j. inf. tecnol. 13, 1797–1803 (2021). https://doi.org/10.1007/s41870-021-00774-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-021-00774-z