
into two main groups: spatial domain and frequency
domain techniques. In the spatial domain, hidden in-
formation is required by directly processing the pixel
values of the cover image. These can be implemented
easily and provide a large inclusion capacity; how-
ever, they are highly detectable using hidden analy-
sis techniques. On the other hand, frequency domain
techniques include embedding hidden information in
the parameters of a modified version of the cover im-
age. The complexity of implementing these solutions
increases the potential benefit of increasing security
against discovery, but its drawbacks remain. It is
the delay in masking higher information against spa-
tial domain techniques. And because the efficiency
of any information cloaking method depends heav-
ily on choosing the embedding region in the middle
of the envelope intelligently and accurately, we pro-
posed an innovative approach that does not exist in
advance based on the use of war strategy optimiza-
tion algorithms and Reed Solomon model to correct
the errors of the secret messages extracted, which en-
hances the reliability of message recovery. This paper
explores in detail the information steganography tech-
nique that is used to replace the least significant bit
inside the host image to include the bits of the secret
message and is adopted in choosing the embedding
points on the war strategy optimization and discusses
its theoretical foundations, implementation and exper-
imental results. The contribution of this research lies
in the advancement of secure information steganog-
raphy practices, which Provides valuable insights to
effectively hide confidential data within images. The
efficiency of any cloaking method can be measured by
using geometric parameters PSNR, histogram, ssim
and BER, which we used to evaluate the stego image
quality produced by our proposed system.
2 RELATED WORKS
Steganography uses handwritten documents to hide a
secret message. Its secure communication and data
protection capabilities have drawn attention in re-
cent years. In examining a similar study (Ayyarao
et al., 2022), war strategy optimization, a new algo-
rithm influenced by war principles, was mentioned.
It solves difficult optimization problems and creates
strong and safe data-hiding schemes when combined
with a masking algorithm. It strikes a new bal-
ance between exploration and exploitation. (Jaradat
et al., 2021) proposed a new steganography method
that uses chaotic partial swarm optimization (CPSO)
to achieve high embedding capacity. The cover im-
age and secret message are divided into blocks, and
each block stores an appropriate amount of secret bits.
Cops involve chaotic dynamics and optimization pro-
cesses. Conventional methods cost less computation-
ally than proposed ones. Steganography methods af-
fect embedding and extraction performance. In the
(Li and He, 2018) proposed employing pixel-value
differencing and PSO to hide critical data in the cover
image. The authors in the (Shah and Bichkar, 2018)
used a liner convergence generator and the genetic al-
gorithm (GA), they were able to embed secret infor-
mation into the cover image by specifying the appro-
priate locations to place it (using at least two bits per
pixel) the proposed model offered strong data clock-
ing at the expense of embedding capacity which was
reduced to just two bits. The authors of (Swain,
2019) used differencing and substitution mechanisms
to hide high-capacity information the LSB two bits
are substituted with zeros, and then the remaining
six bits undergo quotient value differencing (QVD).
In (Nipanikar et al., 2018), an embedding method
based on the use of PSO for optimal selection of
pixel and wavelet transformation with the goal of hid-
ing a secret sound signal in the cover image. In the
(Mohsin et al., 2019) propose a new technique for
image steganography based on PSO by using pixel se-
lection for the concealment of secret data and the spe-
cial domain where are used to find the optimal pixel
in the cover image to embed the secret data based on
genetic algorithm. Despite introducing a novel ap-
proach for concealing images with a significant em-
bedding capacity, the experimental outcomes of this
method did not yield a commendable peak signal-to-
noise ratio (PSNR) value. These findings were com-
paratively lower than those obtained using the genetic
algorithm (GA). (Sharma and Batra, 2021) Proposed.
PSO. Based on Hoffman’s encoding HE. Method for
image steganography. The results of the CI experi-
ment are. Discussed. As are the implications of us-
ing hidden messages of varying sizes. Although it
improved the performance and efficiency of informa-
tion steganography, it did not add visual quality val-
ues beyond the results of our proposed approach. Us-
ing particle swarm optimization (PSO), Muhuri et al.
(Muhuri et al., 2020) developed image steganogra-
phy on integer wavelet transformation (IWT) To lo-
cate the best possible pixel in which to conceal the
secret data within the cover image. To precisely. Lo-
cate the molten iron tanker. The authors employed
the grayscale image matching Techniques to evaluate
the cross marks on the Vessel Particle swarm analysis
is utilized to roughly determine the optimal matching
point of the picture and then they improved Harnis
corner detection algorithm and the sub-pixel approach
are employed for exact positioning in the process of a
A Novel Image Steganography Method Based on Spatial Domain with War Strategy Optimization and Reed Solomon Model
549