loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Hassan Azooz 1 ; Khawla Ben Salah 2 ; Monji Kherallah 3 and Mohamed Naceur 4

Affiliations: 1 University of Almuthanna, Iraq ; 2 National Engineering School Sfax, Tunisia ; 3 Faculty of Sciences of Sfax, Tunisia ; 4 University of Carthage, Tunisia

Keyword(s): War Strategy Optimization, Data Encryption, Data Security, Visual Similarity.

Abstract: In this paper, we propose a novel approach to steganography using the War Search Optimization (WSO) algorithm. Steganography is the practice of concealing messages within other data, such as images or audio files. Our approach employs the WSO algorithm to optimize the parameters of a steganography algorithm, aiming to maximize the perceptual similarity between the cover image and the stego image. We demonstrate the effectiveness of our approach on a variety of cover images and secret messages and show that our method produces stego images with high perceptual similarity to the cover images. Our results suggest that the WSO algorithm is a promising tool for optimizing steganography algorithms. Also, this paper presents a new approach to steganography that utilizes the War Search Optimization (WSO) algorithm. Steganography involves hiding messages within other data, such as images or audio files. Our method applies the WSO algorithm to optimize the parameters of a steganography algorit hm with the goal of maximizing the perceptual similarity between the cover image and the stego image. We evaluate our approach on various cover images and secret messages and demonstrate that our technique generates stego images with high perceptual similarity to the cover images. The results indicate that the WSO algorithm is a valuable tool for optimizing steganography algorithms. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.15.191.74

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Azooz, H., Ben Salah, K., Kherallah, M. and Naceur, M. (2024). A Novel Image Steganography Method Based on Spatial Domain with War Strategy Optimization and Reed Solomon Model. In Proceedings of the 16th International Conference on Agents and Artificial Intelligence - Volume 3: ICAART; ISBN 978-989-758-680-4; ISSN 2184-433X, SciTePress, pages 548-557. DOI: 10.5220/0012366800003636

@conference{icaart24,
author={Hassan Azooz and Khawla {Ben Salah} and Monji Kherallah and Mohamed Naceur},
title={A Novel Image Steganography Method Based on Spatial Domain with War Strategy Optimization and Reed Solomon Model},
booktitle={Proceedings of the 16th International Conference on Agents and Artificial Intelligence - Volume 3: ICAART},
year={2024},
pages={548-557},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012366800003636},
isbn={978-989-758-680-4},
issn={2184-433X},
}

TY - CONF

JO - Proceedings of the 16th International Conference on Agents and Artificial Intelligence - Volume 3: ICAART
TI - A Novel Image Steganography Method Based on Spatial Domain with War Strategy Optimization and Reed Solomon Model
SN - 978-989-758-680-4
IS - 2184-433X
AU - Azooz, H.
AU - Ben Salah, K.
AU - Kherallah, M.
AU - Naceur, M.
PY - 2024
SP - 548
EP - 557
DO - 10.5220/0012366800003636
PB - SciTePress