Access the full text.
Sign up today, get DeepDyve free for 14 days.
Nameer El-Emam (2015)
New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimizationComput. Secur., 55
M. Zamani, Hamed Taherdoost, A. Manaf, R. Ahmad, A. Zeki (2009)
Robust audio steganography via genetic algorithm2009 International Conference on Information and Communication Technologies
Tuba Kurban, P. Çivicioglu, Rifat Kurban, E. Beşdok (2014)
Comparison of evolutionary and swarm based computational techniques for multilevel color image thresholdingAppl. Soft Comput., 23
R. Tataru, Dalia Battikh, S. Assad, H. Noura, O. Déforges (2012)
Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Muhammad Arsalan, S. Malik, Asifullah Khan (2012)
Intelligent reversible watermarking in integer wavelet domain for medical imagesJ. Syst. Softw., 85
Khurram Jawad, Asifullah Khan (2013)
Genetic algorithm and difference expansion based reversible watermarking for relational databasesJ. Syst. Softw., 86
Weiming Zhang, Kede Ma, Nenghai Yu (2014)
Reversibility improved data hiding in encrypted imagesSignal Process., 94
A. BaykasoÄŸlu (2012)
Design optimization with chaos embedded great deluge algorithmAppl. Soft Comput., 12
R. Kuo, Y. Syu, Zhen-Yao Chen, F. Tien (2012)
Integration of particle swarm optimization and genetic algorithm for dynamic clusteringInf. Sci., 195
W. Bender, William Butera, D. Gruhl, Raymond Hwang, F. Paiz, S. Pogreb (2000)
Applications for data hidingIBM Syst. J., 39
Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin (2001)
Image hiding by optimal LSB substitution and genetic algorithmPattern Recognit., 34
B. Alatas (2010)
Chaotic harmony search algorithmsAppl. Math. Comput., 216
L. Chambers (2000)
The Practical Handbook of Genetic Algorithms: Applications, Second Edition
R. Caponetto, L. Fortuna, S. Fazzino, M. Xibilia (2003)
Chaotic sequences to improve the performance of evolutionary algorithmsIEEE Trans. Evol. Comput., 7
A. Kanso, H. Own (2012)
Steganographic algorithm based on a chaotic mapCommunications in Nonlinear Science and Numerical Simulation, 17
Chinchen Chang, Y. Hsieh, Chia-Hsuan Lin (2008)
Sharing secrets in stego images with authenticationPattern Recognit., 41
J Dr’eo, A P’etrowski, P Siarry, E Taillard (2006)
Metaheuristics for hard optimization
M. Ghebleh, A. Kanso (2014)
A robust chaotic algorithm for digital image steganographyCommun. Nonlinear Sci. Numer. Simul., 19
I. Cox, Matthew Miller, J. Bloom, J. Fridrich, T. Kalker (2008)
Chapter 12 – Steganography
M. Suneel (2006)
Chaotic Sequences for Secure CDMAarXiv: Chaotic Dynamics
(2007)
Foundations of Global Genetic Optimization, 74
Tai-Yuan Tu, Chih-Hung Wang (2015)
Reversible data hiding with high payload based on referred frequency for VQ compressed codes indexSignal Process., 108
Asifullah Khan, S. Malik, Asad Ali, Rafiullah Chamlawi, M. Hussain, M. Mahmood, I. Usman (2012)
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D camerasInf. Sci., 216
H. Kanan, Bahram Nazeri (2014)
A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithmExpert Syst. Appl., 41
Miao Zhang, X. Tong (2014)
A new chaotic map based image encryption schemes for several image formatsJ. Syst. Softw., 98
Niansheng Liu (2011)
Pseudo-randomness and complexity of binary sequences generated by the chaotic systemCommunications in Nonlinear Science and Numerical Simulation, 16
Zhengjun Liu, Yu Zhang, W. Liu, F. Meng, Qun Wu, Shutian Liu (2013)
Optical color image hiding scheme based on chaotic mapping and Hartley transformOptics and Lasers in Engineering, 51
LD Chambers (2001)
The practical handbook of genetic algorithms: applications
Ching-Nung Yang, Tse-Shih Chen, K. Yu, Chung-Chun Wang (2007)
Improvements of image sharing with steganography and authenticationJ. Syst. Softw., 80
G Huang, E Cambria, K Toh, B Widrow, Z Xu (2015)
New trends of learning in computational intelligenceIEEE Comput Intell Mag, 10
R. Haupt, S. Haupt (1998)
Practical Genetic Algorithms
Taehyoun Kim, Kwangkyu Lee, Jongmoon Baik (2015)
An effective approach to estimating the parameters of software reliability growth models using a real-valued genetic algorithmJ. Syst. Softw., 102
O. Verma, Puneet Kumar, M. Hanmandlu, Sidharth Chhabra (2012)
High dynamic range optimal fuzzy color image enhancement using Artificial Ant Colony SystemAppl. Soft Comput., 12
Xiaoxia Li, Jianjun Wang (2007)
A steganographic method based upon JPEG and particle swarm optimization algorithmInf. Sci., 177
M. Zaki, J. Varshosaz, M. Fathi (2015)
Preparation of agar nanospheres: comparison of response surface and artificial neural network modeling by a genetic algorithm approach.Carbohydrate polymers, 122
Krishna Bhowal, A. Pal, G. Tomar, P. Sarkar (2010)
Audio Steganography Using GA2010 International Conference on Computational Intelligence and Communication Networks
M. Khan, Jiashu Zhang, Lei Tian (2007)
Chaotic secure content-based hidden transmission of biometric templatesChaos Solitons & Fractals, 32
G. Huang, E. Cambria, K. Toh, B. Widrow, Zongben Xu (2015)
New Trends of Learning in Computational Intelligence [Guest Editorial]IEEE Comput. Intell. Mag., 10
M. Khodaei, K. Faez (2010)
Image Hiding by Using Genetic Algorithm and LSB Substitution
Dixiong Yang, Zhenjun Liu, Jilei Zhou (2014)
Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimizationCommun. Nonlinear Sci. Numer. Simul., 19
Chinchen Chang, Chih-Yang Lin, Yi-Hsuan Fan (2008)
Lossless data hiding for color images based on block truncation codingPattern Recognit., 41
Kuanchin Chen (2009)
Digital Watermarking and Steganography
K. Dasgupta, J. Mondal, P. Dutta (2013)
Optimized Video Steganography Using Genetic Algorithm (GA)Procedia Technology, 10
S. Elshoura, D. Megherbi (2013)
A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef momentsSignal Process. Image Commun., 28
E. Elattar (2015)
A hybrid genetic algorithm and bacterial foraging approach for dynamic economic dispatch problemInternational Journal of Electrical Power & Energy Systems, 69
C. Lin, Wen-Hsiang Tsai (2004)
Secret image sharing with steganography and authenticationJ. Syst. Softw., 73
Ratnakirti Roy, Anirban Sarkar, S. Changder (2013)
Chaos based Edge Adaptive Image SteganographyProcedia Technology, 10
Chia-Chun Wu, S. Kao, M. Hwang (2011)
A high quality image sharing with steganography and adaptive authentication schemeJ. Syst. Softw., 84
Chi-Kwong Chan, Lee-Ming Cheng (2004)
Hiding data in images by simple LSB substitutionPattern Recognit., 37
Data hiding algorithms, which have many methods describing in the literature, are widely used in information security. In data hiding applications, optimization techniques are utilized in order to improve the success of algorithms. The genetic algorithm is one of the largely using heuristic optimization techniques in these applications. Long running time is a disadvantage of the genetic algorithm. In this paper, chaotic maps are used to improve the data hiding technique based on the genetic algorithm. Peak signal to noise ratio (PSNR) is chosen as the fitness function. Different sized secret data are embedded into the cover object using random function of MATLAB and chaotic maps. Randomness of genetic is performed by using different chaotic maps. The success of the proposed method is presented with comparative results. It is observed that gauss, logistic and tent maps are faster than random function for proposed data hiding method.
Artificial Intelligence Review – Springer Journals
Published: Jan 9, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.