A New Robust Data Hiding Method in Digital Image based on Pelican Optimization Algorithm
Main Article Content
Abstract
Sharing and exchanging data over networks is often insecure, especially if the data is secret and important. Steganography is key research fields in information hiding, focusing on invisible communication and digital steganography, which offers private, secure communication through multimedia carriers. In this paper, propose a new steganography approach for hiding data in digital images using Pelican Optimization Algorithm (POA) and Least Significant Bit (LSB). The digital image was first divided into (4*4) blocks, then determined the best blocks for data hiding using POA, after that used LSB for data hiding. The results (MSE and PSNR are 0.7838 and 49.1743 respectively) are good when compared with related works and show good image quality.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
1. Gary Ka C, H. An Overview on Steganography. Advanced in Computers. 2011;83:51-107. https://doi.org/10.1016/B978-0-12-385510-7.00002-3
2. Douglas M, Bailey, K., Leeney, . An overview of steganography techniques applied to the protection of biometric data. Multimed Tools Appl 2018;77:17333–73. https://doi.org/10.1007/s11042-017-5308-3
3. Mansi SaV, M. current Statues and Key Issues in Image Steganography:A Survey. Computer Science Review. 2014;13:95-113. https://doi.org/10.1016/j.cosrev.2014.09.001
4. Patel SaC, S., . Steganography Using Hybrid Crypto Encryption Technique. IOT Based Control Networks and Intelligent Systems: Proceedings of 3rd ICICNIS. 2022:453-66. . https://doi.org/10.1007/978-981-19-5845-8_32
5. Trojovský P, Dehghani M. Pelican optimization algorithm: A novel nature-inspired algorithm for engineering applications. Sensors. 2022;22(3):855. https://doi.org/10.3390/s22030855
6. Abualigah L, Yousri D, Abd Elaziz M, Ewees AA, Al-Qaness MA, Gandomi AH. Aquila optimizer: a novel meta-heuristic optimization algorithm. Computers & Industrial Engineering. 2021;157:107250. https://doi.org/10.1016/j.cie.2021.107250
7. Geetha K, Anitha V, Elhoseny M, Kathiresan S, Shamsolmoali P, Selim MM. An evolutionary lion optimization algorithm‐based image compression technique for biomedical applications. Expert Systems. 2021;38(1):e12508. https://doi.org/10.1111/exsy.12508
8. Alamir N, Kamel S, Megahed TF, Hori M, Abdelkader SM. Developing hybrid demand response technique for energy management in microgrid based on pelican optimization algorithm. Electric Power Systems Research. 2023;214:108905. https://doi.org/10.1016/j.epsr.2022.108905
9. SeyedGarmroudi S, Kayakutlu G, Kayalica MO, Çolak Ü. Improved Pelican optimization algorithm for solving load dispatch problems. Energy. 2024;289:129811. https://doi.org/10.1016/j.energy.2023.129811
10. Dabeer O, Sullivan K, Madhow U, Chandrasekaran S, Manjunath B. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing. 2004;52(10):3046-58. . https://doi.org/10.1109/TSP.2004.833869
11. Qasim AJ, Din R, Alyousuf FQA. Extended Method of Least Significant Bits on Colour Images in Steganography. QALAAI ZANIST SCIENTIFIC JOURNAL. 2024;9(3):1146-58. https://doi.org/10.25212/lfu.qzj.9.3.45
12. Darwis D, Pamungkas N, editors. Comparison of least significant bit, pixel value differencing, and modulus function on steganography to measure image quality, storage capacity, and robustness. Journal of Physics: Conference Series; 2021: IOP Publishing. https://doi.org/10.1088/1742-6596/1751/1/012039
13. Sharif A, Mollaeefar M, Nazari M. A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools and Applications. 2017;76:7849-67. https://doi.org/10.1007/s11042-016-3398-y
14. ALabaichi A, Al-Dabbas MaAAK, Salih A. Image steganography using least significant bit and secret map techniques. International journal of electrical & computer engineering (2088-8708). 2020;10(1). https://doi.org/10.11591/ijece.v10i1.pp935-946
15. Ghnemat R, Al-mashaqbeh S, editors. Novel Image Data Augmentation Technique for Deep Learning Using Least Significant Bit Encryption. Proceedings of the 2024 9th International Conference on Machine Learning Technologies; 2024. . https://doi.org/10.1145/3674029.3674053
16. Hameed MA, Hassaballah M, Abdelazim R, Sahu AK. A novel medical steganography technique based on adversarial neural cryptography and digital signature using least significant bit replacement. International Journal of Cognitive Computing in Engineering. 2024;5:379-97. https://doi.org/10.1016/j.ijcce.2024.08.002
17. Talib E, Hassan NF, Jamil AS. The Defensive Methods Against Deepfake. Iraqi Journal of Science. 2023:5345-57. https://doi.org/10.24996/ijs.2023.64.10.39
18. Mellimi S, Rajput V, Ansari IA, Ahn CW. A fast and efficient image watermarking scheme based on deep neural network. Pattern Recognition Letters. 2021;151:222-8. https://doi.org/10.1016/j.patrec.2021.08.015
19. Jamil AS, Hassan NF. Proposed Color Image Lightweight Encryption using SALSA20 with Key Derivation Function. Baghdad Science Journal. 2025;22(1). https://doi.org/10.21123/bsj.2024.9280
20. Habib HB, Hussein WA, Abdul-Rahman AK. A hybrid cryptosystem based on latin square and the modified BB84 quantum key distribution. Tikrit Journal of Pure Science. 2022;27(4):100-3. https://doi.org/10.25130/tjps.v27i4.42
21. AL-Khafaji GK, Hussain AA. A Pixel Based Method for Image Compression. Tikrit Journal of Pure Science. 2021;26(1). https://doi.org/10.25130/tjps.v26i1.108
22. Hussein QM, Abdullah AS, Mohammed NQ. The efficiency of Color Models layers at Color Images as Cover in text hiding. Tikrit Journal of Pure Science. 2016;21(1):130-9. https://tjps.tu.edu.iq/index.php/tjps/article/download/963/624