A New Robust Data Hiding Method in Digital Image based on Pelican Optimization Algorithm

Main Article Content

Ebtehal Talib
https://orcid.org/0000-0002-9513-5877

Abstract

Sharing and exchanging data over networks is often insecure, especially if the data is secret and important. Steganography is key research fields in information hiding, focusing on invisible communication and digital steganography, which offers private, secure communication through multimedia carriers. In this paper, propose a new steganography approach for hiding data in digital images using Pelican Optimization Algorithm (POA) and Least Significant Bit (LSB). The digital image was first divided into (4*4) blocks, then determined the best blocks for data hiding using POA, after that used LSB for data hiding. The results (MSE and PSNR are 0.7838 and 49.1743 respectively) are good when compared with related works and show good image quality.

Article Details

How to Cite
Talib, E. (2025). A New Robust Data Hiding Method in Digital Image based on Pelican Optimization Algorithm. Tikrit Journal of Pure Science, 30(4), 83–92. https://doi.org/10.25130/tjps.v30i4.1945
Section
Articles

References

1. Gary Ka C, H. An Overview on Steganography. Advanced in Computers. 2011;83:51-107. https://doi.org/10.1016/B978-0-12-385510-7.00002-3

2. Douglas M, Bailey, K., Leeney, . An overview of steganography techniques applied to the protection of biometric data. Multimed Tools Appl 2018;77:17333–73. https://doi.org/10.1007/s11042-017-5308-3

3. Mansi SaV, M. current Statues and Key Issues in Image Steganography:A Survey. Computer Science Review. 2014;13:95-113. https://doi.org/10.1016/j.cosrev.2014.09.001

4. Patel SaC, S., . Steganography Using Hybrid Crypto Encryption Technique. IOT Based Control Networks and Intelligent Systems: Proceedings of 3rd ICICNIS. 2022:453-66. . https://doi.org/10.1007/978-981-19-5845-8_32

5. Trojovský P, Dehghani M. Pelican optimization algorithm: A novel nature-inspired algorithm for engineering applications. Sensors. 2022;22(3):855. https://doi.org/10.3390/s22030855

6. Abualigah L, Yousri D, Abd Elaziz M, Ewees AA, Al-Qaness MA, Gandomi AH. Aquila optimizer: a novel meta-heuristic optimization algorithm. Computers & Industrial Engineering. 2021;157:107250. https://doi.org/10.1016/j.cie.2021.107250

7. Geetha K, Anitha V, Elhoseny M, Kathiresan S, Shamsolmoali P, Selim MM. An evolutionary lion optimization algorithm‐based image compression technique for biomedical applications. Expert Systems. 2021;38(1):e12508. https://doi.org/10.1111/exsy.12508

8. Alamir N, Kamel S, Megahed TF, Hori M, Abdelkader SM. Developing hybrid demand response technique for energy management in microgrid based on pelican optimization algorithm. Electric Power Systems Research. 2023;214:108905. https://doi.org/10.1016/j.epsr.2022.108905

9. SeyedGarmroudi S, Kayakutlu G, Kayalica MO, Çolak Ü. Improved Pelican optimization algorithm for solving load dispatch problems. Energy. 2024;289:129811. https://doi.org/10.1016/j.energy.2023.129811

10. Dabeer O, Sullivan K, Madhow U, Chandrasekaran S, Manjunath B. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing. 2004;52(10):3046-58. . https://doi.org/10.1109/TSP.2004.833869

11. Qasim AJ, Din R, Alyousuf FQA. Extended Method of Least Significant Bits on Colour Images in Steganography. QALAAI ZANIST SCIENTIFIC JOURNAL. 2024;9(3):1146-58. https://doi.org/10.25212/lfu.qzj.9.3.45

12. Darwis D, Pamungkas N, editors. Comparison of least significant bit, pixel value differencing, and modulus function on steganography to measure image quality, storage capacity, and robustness. Journal of Physics: Conference Series; 2021: IOP Publishing. https://doi.org/10.1088/1742-6596/1751/1/012039

13. Sharif A, Mollaeefar M, Nazari M. A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools and Applications. 2017;76:7849-67. https://doi.org/10.1007/s11042-016-3398-y

14. ALabaichi A, Al-Dabbas MaAAK, Salih A. Image steganography using least significant bit and secret map techniques. International journal of electrical & computer engineering (2088-8708). 2020;10(1). https://doi.org/10.11591/ijece.v10i1.pp935-946

15. Ghnemat R, Al-mashaqbeh S, editors. Novel Image Data Augmentation Technique for Deep Learning Using Least Significant Bit Encryption. Proceedings of the 2024 9th International Conference on Machine Learning Technologies; 2024. . https://doi.org/10.1145/3674029.3674053

16. Hameed MA, Hassaballah M, Abdelazim R, Sahu AK. A novel medical steganography technique based on adversarial neural cryptography and digital signature using least significant bit replacement. International Journal of Cognitive Computing in Engineering. 2024;5:379-97. https://doi.org/10.1016/j.ijcce.2024.08.002

17. Talib E, Hassan NF, Jamil AS. The Defensive Methods Against Deepfake. Iraqi Journal of Science. 2023:5345-57. https://doi.org/10.24996/ijs.2023.64.10.39

18. Mellimi S, Rajput V, Ansari IA, Ahn CW. A fast and efficient image watermarking scheme based on deep neural network. Pattern Recognition Letters. 2021;151:222-8. https://doi.org/10.1016/j.patrec.2021.08.015

19. Jamil AS, Hassan NF. Proposed Color Image Lightweight Encryption using SALSA20 with Key Derivation Function. Baghdad Science Journal. 2025;22(1). https://doi.org/10.21123/bsj.2024.9280

20. Habib HB, Hussein WA, Abdul-Rahman AK. A hybrid cryptosystem based on latin square and the modified BB84 quantum key distribution. Tikrit Journal of Pure Science. 2022;27(4):100-3. https://doi.org/10.25130/tjps.v27i4.42

21. AL-Khafaji GK, Hussain AA. A Pixel Based Method for Image Compression. Tikrit Journal of Pure Science. 2021;26(1). https://doi.org/10.25130/tjps.v26i1.108

22. Hussein QM, Abdullah AS, Mohammed NQ. The efficiency of Color Models layers at Color Images as Cover in text hiding. Tikrit Journal of Pure Science. 2016;21(1):130-9. https://tjps.tu.edu.iq/index.php/tjps/article/download/963/624