<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">55195</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2024.055195</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization</article-title>
<alt-title alt-title-type="left-running-head">An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization</alt-title>
<alt-title alt-title-type="right-running-head">An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Jasim</surname><given-names>Zinah Khalid Jasim</given-names></name><email>203720304@ogr.altinbas.edu.tr</email></contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Kurnaz</surname><given-names>Sefer</given-names></name><email>sefer.kurnaz@altinbas.edu.tr</email></contrib>
<aff><institution>Department of Electrical and Computer Engineering, Altinbas University</institution>, <addr-line>Istanbul, 34000</addr-line>, <country>Turkey</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Authors: Zinah Khalid Jasim Jasim. Email: <email>203720304@ogr.altinbas.edu.tr</email>; Sefer Kurnaz. Email: <email>sefer.kurnaz@altinbas.edu.tr</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>12</day>
<month>9</month>
<year>2024</year></pub-date>
<volume>80</volume>
<issue>3</issue>
<fpage>4643</fpage>
<lpage>4662</lpage>
<history>
<date date-type="received">
<day>20</day>
<month>6</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>14</day>
<month>8</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 The Authors.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_55195.pdf"></self-uri>
<abstract>
<p>This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization (ACO) algorithm. Image steganography, a technique of embedding hidden information in digital photographs, should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect. The contemporary methods of steganography are at best a compromise between these two. In this paper, we present our approach, entitled Ant Colony Optimization (ACO)-Least Significant Bit (LSB), which attempts to optimize the capacity in steganographic embedding. The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte, both for integrity verification and the file checksum of the secret data. This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images. The ACO algorithm uses adaptive exploration to select some pixels, maximizing the capacity of data embedding while minimizing the degradation of visual quality. Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement. The levels of pheromone are modified to reinforce successful pixel choices. Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30% in the embedding capacity compared with traditional approaches; the average Peak Signal to Noise Ratio (PSNR) is 40.5 dB with a Structural Index Similarity (SSIM) of 0.98. The approach also demonstrates very high resistance to detection, cutting down the rate by 20%. Implemented in MATLAB R2023a, the model was tested against one thousand publicly available grayscale images, thus providing robust evidence of its effectiveness.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Steganography</kwd>
<kwd>steganalysis</kwd>
<kwd>capacity optimization</kwd>
<kwd>ant colony algorithm</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>This steganographic method has been the most influential for hiding information throughout history. This method efficiently hides a secret message within the nth letter of each text message [<xref ref-type="bibr" rid="ref-1">1</xref>]. The significance of this methodology has diminished since the rise of the internet and various digital file types. Because text files include very little unnecessary content, this method is not frequently used. Picture steganography involves hiding data within an image by using a cover object that seems to be an image [<xref ref-type="bibr" rid="ref-2">2</xref>]. Data is hidden within this image by manipulating pixel intensities. Photographs are frequently utilized as cover sources in digital steganography methods because a digital image consists of numerous bits. Since video files contain both auditory and visual elements, most of the methods used for audio and photo files can also be used for video files. Video files have the advantage of storing large amounts of data and presenting a dynamic combination of visuals and sounds [<xref ref-type="bibr" rid="ref-3">3</xref>]. Humans may overlook subtle distortions because of the constant flow of information. When confidential data is concealed within an audio recording. This method utilizes masking to use the human ear&#x2019;s capacity to gently conceal information. In audio steganography, the existence of a loud audible sound may lead to the soft audible noises being ignored [<xref ref-type="bibr" rid="ref-4">4</xref>]. Audio steganography&#x2019;s appeal is reduced by the large file size of audio recordings.</p>
<p>The Ant Colony Optimization (ACO) algorithm, based on biological principles, has proven to be highly effective in tackling complex optimization problems. ACO mimics the cooperative efforts of a group of artificial ants by using pheromone trails to find the best solutions [<xref ref-type="bibr" rid="ref-5">5</xref>]. The system&#x2019;s structure was inspired by the foraging habits of real ants. Ants explore and integrate various solutions suggested by pheromone traces to improve the search strategy of their program through iterative refinement. ACO is used to enhance the pixel selection process for embedding data in image steganography [<xref ref-type="bibr" rid="ref-6">6</xref>].</p>
<p>Image steganography is a crucial method used to covertly encode confidential information in many media types such as text, photos, audio, and video. The explain part of <xref ref-type="table" rid="table-1">Table 1</xref> explores different methods that improve the effectiveness of data embedding while preserving the integrity of the original image [<xref ref-type="bibr" rid="ref-7">7</xref>]. Security researchers and developers need to create technical measures to stop the exposure of confidential, business, and governmental files because of the rising number of hostile attacks. This work also attempts to improve data security by creating a more secure technique for transferring sensitive data over communication networks [<xref ref-type="bibr" rid="ref-8">8</xref>].</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>A comprehensive comparison with existing state-of-the-art steganographic methods</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Method</th>
<th>Embedding capacity (bits)</th>
<th>PSNR (dB)</th>
<th>SSIM</th>
<th>Detection resistance</th>
</tr>
</thead>
<tbody>
<tr>
<td>Proposed ACO-LSB method</td>
<td>High</td>
<td>40.5</td>
<td>0.98</td>
<td>High</td>
</tr>
<tr>
<td>LSB matching</td>
<td>Moderate</td>
<td>37.8</td>
<td>0.95</td>
<td>Low</td>
</tr>
<tr>
<td>F5 algorithm</td>
<td>Low</td>
<td>36.2</td>
<td>0.92</td>
<td>Moderate</td>
</tr>
<tr>
<td>OutGuess</td>
<td>Moderate</td>
<td>38.1</td>
<td>0.94</td>
<td>Moderate</td>
</tr>
<tr>
<td>Wavelet obtained weights (WOW) algorithm</td>
<td>High</td>
<td>39.0</td>
<td>0.97</td>
<td>High</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Traditional LSB embedding, despite being user-friendly and having a large storage capacity, is nonetheless susceptible to detection since it relies on consistent embedding patterns [<xref ref-type="bibr" rid="ref-9">9</xref>]. By discretion through the alteration of frequency domain coefficients, the Discrete Wavelet Transform [<xref ref-type="bibr" rid="ref-10">10</xref>], and Cosine Transform [<xref ref-type="bibr" rid="ref-11">11</xref>] enhanced the robustness and confidentiality of concealed data. Cosine Expressive on the contrary, transform-based approaches exhibit a slight improvement in computational capacity and mitigation of visual distortions when compared to spatial domain methodologies [<xref ref-type="bibr" rid="ref-12">12</xref>]. The implementation of optimization techniques is critical for the substantial improvement of steganography&#x2019;s efficacy. For the purpose of optimizing the embedding via simulation of natural selection mechanisms, genetic algorithms (GA) are utilized [<xref ref-type="bibr" rid="ref-13">13</xref>]. This leads to substantial improvements in capability when compared to conventional approaches [<xref ref-type="bibr" rid="ref-14">14</xref>]. Particle Swarm Optimization (PSO) and swarm intelligence facilitate accurate pixel selection in order to enhance image embedding through adaptation to various image attributes [<xref ref-type="bibr" rid="ref-15">15</xref>]. The principal scenario of the steganography system is depicted in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Steganography system</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-1.tif"/>
</fig>
<p>Therefore, this research work proposes the ACO-LSB methodology for enhancing the capacity and security of image steganography. Thoroughly the ACO-based methodology outperforms the previous method of PSO-LSB in encoding image steganography data as given in [<xref ref-type="bibr" rid="ref-16">16</xref>]. In both capacity and security, it is more beneficial. ACOs in steganography can enhance the credibility of the stored information and improve efficiency and security. It opens up new avenues for improving the security of multimedia and secure communication applications. This research work could show the benefits of ACO in this respect, which is the pathfinder to future research to safeguard the integrity of digital data through obfuscation as mentioned in [<xref ref-type="bibr" rid="ref-17">17</xref>]. The security analysis of the proposed ACO-LSB method identifies several potential vulnerabilities and proposes countermeasures to counter them. The three major vulnerabilities are statistical detection, visual quality degradation, and the payload capacity <italic>vs</italic>. security trade-off. With the preceding vulnerability analysis in mind, we would like to propose some countermeasures against these ones as shown in <xref ref-type="table" rid="table-2">Table 2</xref>.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>The three major vulnerabilities are statistical detection, visual quality degradation, and the payload capacity <italic>vs</italic>. security trade-off, with the preceding vulnerability analysis</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Potential vulnerability</th>
<th>Description</th>
<th>Proposed countermeasures</th>
</tr>
</thead>
<tbody>
<tr>
<td>Statistical detection</td>
<td>Detectable statistical anomalies are introduced by embedding data.</td>
<td>Employ advanced statistical techniques to minimize detectable anomalies.</td>
</tr>
<tr>
<td>Visual quality degradation</td>
<td>Noticeable artifacts and quality degradation due to significant embedding.</td>
<td>Develop adaptive embedding strategies based on local image complexity.</td>
</tr>
<tr>
<td>Payload capacity <italic>vs</italic>. security trade-off</td>
<td>Increasing embedding capacity may compromise security.</td>
<td>Balance high payload capacity with security using adaptive strategies and hybrid approaches.</td>
</tr>
<tr>
<td>Single method vulnerability</td>
<td>Reliance on a single steganographic method may be easier to detect.</td>
<td>Combine ACO-LSB with other steganographic methods for a hybrid approach.</td>
</tr>
<tr>
<td>Fixed pheromone levels</td>
<td>Static pheromone levels may not adapt well to varying image characteristics.</td>
<td>Introduce post-embedding pheromone adjustment to refine embedding positions.</td>
</tr>
<tr>
<td>Integrity verification</td>
<td>Embedded data may be prone to distortions and modifications.</td>
<td>Incorporate error detection and correction codes within the embedded data.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s2">
<label>2</label>
<title>Methodology</title>
<p>The ACO-LSB approach has been used in this study to hide a secret girl image under a random cover image. It checks the integrity of the steganographic image once an attack has been carried out on it. The experimental data is shared with the public via databases created from image collections started in academic studies [<xref ref-type="bibr" rid="ref-18">18</xref>]. The proposed methodology consists of three components. Capacity expansion and image embedding are techniques used to obscure checksums and communications. The attack involves altering some aspects of a steganographic image to meet the attacker&#x2019;s objectives [<xref ref-type="bibr" rid="ref-19">19</xref>]. Extraction and validation procedures were carried out to verify the integrity of private communications.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Expansion Technique</title>
<p>This section evaluates the performance of the proposed steganography technique against ACO-LSB. Parameters were analyzed to evaluate the quality and effectiveness of the hidden steganographic image [<xref ref-type="bibr" rid="ref-20">20</xref>]. Capacity: Number of bits hidden in the cover image. The average difference in pixels between the cover image and the steganographic image to calculate the quality of the steganographic image through the Peak Signal to Noise Ratio (PSNR). A higher PSNR value ensures that the quality of the steganographic image is better [<xref ref-type="bibr" rid="ref-21">21</xref>]. The PSNR value is calculated based on the mean square error, which calculates the squared difference between the steganography and the cover images. The more the error decreases, the lower the Mean Squared Error value. Following are the equations for calculating PSNR and Mean Squared Error (MSE):
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>W</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>H</mml:mi></mml:mrow></mml:mfrac><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>W</mml:mi></mml:mrow></mml:munderover><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>J</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></disp-formula>
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mi>P</mml:mi><mml:mi>S</mml:mi><mml:mi>N</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>10</mml:mn><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mfrac><mml:msup><mml:mn>255</mml:mn><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p><italic>W</italic>: Width of the image.</p>
<p><italic>H</italic>: Height of the image.</p>
<p><italic>x</italic><sub><italic>ij</italic></sub>: Pixel value at position (<italic>i, j</italic>) in the original image.</p>
<p><italic>y</italic><sub><italic>ij</italic></sub>: Pixel value at position (<italic>i, j</italic>) in the distorted or reconstructed image.</p>
<p>The equation in the figure is the sum of the Mean Squared Error (MSE) and the Peak Signal-to-Noise Ratio (PSNR). These two are major functions in major image processing-based software used to determine the quality of an image. MSE is estimated by computing the average of the squared differences between the original image&#x2019;s pixel values and the particular pixel values in the distorted image. It gives an average error of the two pictures. An MSE value closer to zero means the original and distorted images are identical. Maximum gray level of the image. For an 8 bits image, gray levels are between 0 and 255. PSNR is the Peak Signal-to-Noise Ratio measurement system. It is quantified in decibels. The higher the value of PSNR, the better is the reconstructed image in relation to the original image; therefore, quality will be implied. The relation of PSNR is inversely proportional to MSE. As the MSE falls, the PSNR rises. An average of squared differences between the two images&#x2014;original and the reconstructed one. Lower values are better values. PSNR is a measure of the quality of the reconstructed image with respect to the original. The higher the value, the better, and this metric is, hence, more interpretable for human perception because it takes into account the dynamic range of pixel values.</p>
<p>The given metrics together are pretty much used for the evaluation of methods of compression and reconstruction of images.</p>
<p>Where x<sub>ij</sub> and y<sub>ij</sub> denote the pixel values for the cover and steganographic images, respectively, while &#x201C;W &#x00D7; H&#x201D; represents the resolution of the cover image. An outstanding indicator of the reception of photographs and recordings is SSIM. Image degradation can be detected by examining the observed changes in the structural image data [<xref ref-type="bibr" rid="ref-22">22</xref>].</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Embedding Method</title>
<p>To reduce the possibility of an enemy attack, the hidden message is placed inside a single-colored image and sent across a communication channel. The embedding procedure should produce a steganographic image that meets standards for visual imperceptibility and PSNR value, reducing the chances of discovery [<xref ref-type="bibr" rid="ref-23">23</xref>]. During the embedding process of creating a steganographic image, a checksum is added, and another checksum is calculated during the extraction phase. By comparing the two checksums, we can determine if any alterations have occurred. If the steganography has not been compromised, the recovered secret file should have identical contents and format to the original secret file [<xref ref-type="bibr" rid="ref-24">24</xref>]. Subsequently, launching an attack with the aim of creating steganographic changes in images that need to be identified throughout the extraction procedure. Extract the sensitive message and verify its integrity by comparing checksums [<xref ref-type="bibr" rid="ref-25">25</xref>]. Identify the altered bytes in the hidden image by comparing the data bit pair of each byte with its corresponding decoy bit pair in case of detecting an intrusion.</p>
<p>To address the concern regarding the limited evaluation set, we have expanded our evaluation to include a diverse set of images. The new dataset includes images with varying levels of detail, textures, and contrasts to ensure the robustness and effectiveness of the proposed ACO-LSB method across different scenarios. Below is a summary in <xref ref-type="table" rid="table-3">Table 3</xref> of the expanded evaluation.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>An expanded evaluation demonstrates that the proposed ACO-LSB method maintains its superior performance across various types of images, reinforcing its robustness and generalizability</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Image category</th>
<th>Number of images</th>
<th>Embedding capacity (bits)</th>
<th>PSNR (dB)</th>
<th>SSIM</th>
<th>Detection resistance</th>
</tr>
</thead>
<tbody>
<tr>
<td>Nature</td>
<td>1000</td>
<td>High</td>
<td>40.3</td>
<td>0.97</td>
<td>High</td>
</tr>
<tr>
<td>Urban</td>
<td>1000</td>
<td>High</td>
<td>40.7</td>
<td>0.98</td>
<td>High</td>
</tr>
<tr>
<td>Medical</td>
<td>1000</td>
<td>High</td>
<td>40.1</td>
<td>0.96</td>
<td>High</td>
</tr>
<tr>
<td>Portraits</td>
<td>1000</td>
<td>High</td>
<td>40.6</td>
<td>0.98</td>
<td>High</td>
</tr>
<tr>
<td>Abstract</td>
<td>1000</td>
<td>High</td>
<td>40.5</td>
<td>0.97</td>
<td>High</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The identification of changed bytes involves a comparison mechanism designed to ensure the integrity and accuracy of the embedded data. Dividing the secret data to bytes, each byte has been divided into four pairs of bits. Each of these pairs of bits were embedded in the least significant bits of the cover image pixels. Taken parallel with these data bit pairs are decoy bit pairs that are created and embedded together or in a specific pattern within the same block of an image. In the extraction phase, data bit pairs with corresponding decoy bit pairs are extracted from a cover image. The retrieved data bit pairs are compared with the indicated decoy bit to verify the integrity of every byte of the extracted secret data. In the case of a mismatch of a data bit pair with its corresponding decoy bit pair, this could either be an altered byte or an erroneously built one. This bit difference is then used for error-handling routines by signaling corrupted bytes and then further actions of error correction could entail re-embedding the data or using the error detection and correction codes.</p>
<sec id="s2_2_1">
<label>2.2.1</label>
<title>Embedding Algorithm</title>
<p><list list-type="bullet">
<list-item>
<p>Preprocess the cover image by converting it to grayscale and dividing it into four blocks.</p></list-item>
<list-item>
<p>Convert the secret data into binary and split each byte into four pairs of bits.</p></list-item>
<list-item>
<p>Initialize ACO parameters, including pheromone levels, number of ants, and exploration settings.</p></list-item>
<list-item>
<p>For each block, use ants to explore pixel positions, and embed data bit pairs and decoy bit pairs into the LSBs of selected pixels.</p></list-item>
<list-item>
<p>Update pheromone levels based on embedding quality, allowing evaporation to prevent local optima.</p></list-item>
<list-item>
<p>Combine the four blocks to form the final stego image and store it for transmission or storage.</p></list-item>
</list></p>
</sec>
<sec id="s2_2_2">
<label>2.2.2</label>
<title>Extraction Algorithm</title>
<p><list list-type="bullet">
<list-item>
<p>Preprocess the stego image by converting it to grayscale and dividing it into four blocks.</p></list-item>
<list-item>
<p>Initialize ACO parameters to explore potential pixel positions for data extraction.</p></list-item>
<list-item>
<p>For each block, use ants to identify optimal pixel positions and extract data bit pairs and decoy bit pairs from LSBs.</p></list-item>
<list-item>
<p>Compare extracted data bit pairs with corresponding decoy bit pairs to identify any discrepancies.</p></list-item>
<list-item>
<p>Apply error detection and correction codes to correct any errors in the extracted data.</p></list-item>
<list-item>
<p>Reconstruct the secret data from extracted bit pairs, verify its integrity using checksums, and store the final data as shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
</list-item>
</list></p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Data embedding and extraction</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-2.tif"/>
</fig>
</sec>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Proposed Approach Considerations</title>
<p>The grayscale image cover conceals covert multimedia files and misleading data to deceive attackers into believing they are authentic. 50% of the steganographic image will be allocated for hiding data. 25% will be allocated for concealing the secret message, while the remaining 25% will be designated for storing dummy data for integrity verification. The steganographic images will have their right half-bytes altered to include two bits of counterfeit data and two bits of the true secret data, while the left half-bytes will remain unaltered to minimize distortion. When embedding, the concealed multimedia file will be seen as a series of bytes, irrespective of its initial format [<xref ref-type="bibr" rid="ref-26">26</xref>]. The grayscale cover conceals a multimedia file that will be segmented into four vertical sections, each comprising two bits. Steganography in such a case will deal with 2-bit blocks of the secret message instead of 2 LSB. We added an explanation since some of the reviewers indicated that the ACO algorithm and its integration with LSB are not explained in enough detail for readers who have limited or no experience with these techniques to follow. This new section presents an overview of the working of the ACO algorithm, explaining each major step in the process from initialization to ant path construction, pheromone updates, and finally termination. The two-bit decoy data will be exact complements of the secret fragment. These are embedded in the third and fourth least significant bits of every byte. The PSNR values of the cover and steganographic images should match those produced by popular image comparison applications such as Image Magic. The greatest hiding capacity of a grayscale cover utilizing 2-LSB to hide a secret image is determined by the formula HC &#x003D; Width &#x00D7; Height/4. An image with dimensions of 512 &#x00D7; 512 pixels and a file size of 262,144 bytes can store an encoded quantity of 65,536 bytes (64 kilobytes). The cover image divides every byte pixel of the hidden multimedia file into four two-bit pairs. The bit pair is encoded in the two least significant bits (LSB) of bytes in the cover picture, as seen in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Reading secret image as a stream of bytes</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-3.tif"/>
</fig>
<p>The grayscale cover has data inserted only in the fourth bit of the right half-byte of each byte, with each pixel represented by a single byte (8 bits). The decoy data is put in 2 MSB (Most Significant Bit) of the right half-byte (q2), while the confidential message fragments will be saved in the two least significant bits (q1). as shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The grayscale covers the data</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-4.tif"/>
</fig>
<p>During the extraction and verification procedure, any modifications made to the hidden message are identified using two distinct strategies: To conceal the confidential data, the right half-byte (4-LSB) is initially utilized in pair comparison. The two-bit fragments (2-LSB) on the right conceal the true secret information, whereas the two-bit fragments on the left contain the counterfeit data, which is the inverse of the two-bit fragments of the secret information. After the decoy has been re-inverted, the data bit pair and decoy pair of extracted bytes from the secret message are compared during verification. When the byte remains unchanged, there should be correspondence between the two pairings. When byte pairs fail to match, the altered byte is identified. Through this procedure, a list of the locations of modified bytes will be produced. Secondly, the proposed method employs a checksum comparison to detect any alterations that may have been performed on the confidential information. Certain mutations that are undetectable via pair comparison can be identified via checksum comparison of the embedding checksum and the extracting checksum values. The processing of confidential data is depicted in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>, wherein every byte is divided into pairs of bits, irrespective of the file format of the data. The secret bit pairings are stored in the accessible channel&#x2019;s least significant bit (LSB) pairs. The MATLAB checksum function uses the MD5 (MessageDigest Algorithm 5) checksum algorithm to generate a checksum for the secret file. For comparison at a later time, the checksum of the file will be concealed within the steganography file as part of the extraction or verification procedure. Additionally, the value of the checksum may be documented in a file for potential future use by the extract-verify module. The embedding procedure utilizes the Extract-Verify main and Stego Bytes methods of algorithms as shown in <xref ref-type="fig" rid="fig-5">Figs. 5</xref> and <xref ref-type="fig" rid="fig-6">6</xref>.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>(a) The embedding algorithm, and (b) The secret bytes process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-5.tif"/>
</fig><fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Four cover bytes encapsulate the secret byte with a decoy mechanism</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-6.tif"/>
</fig>
<p>The division of the stego image into blocks is implemented to achieve various objectives, supported by both theoretical and experimental foundations. Theoretically, dividing the image into smaller blocks enhances manageability and control over the embedding process, facilitating the precise optimization of embedding positions using the Ant Colony Optimization (ACO) algorithm. This approach aligns with the divide-and-conquer strategy, which is well-established in computer science for handling complex tasks. Furthermore, the distribution of hidden data across multiple blocks improves security by reducing the likelihood of detectable patterns or statistical anomalies, thus enhancing resistance to steganalysis. This method has, hence, had significant benefits when tested experimentally against other methods. Simulations conducted on more than 1000 open-source grayscale images demonstrate that the block-based approach can increase embedding capacity by as much as 30% compared to traditional methods, with the quality of the image kept very high at an average PSNR of about 40.5 dB and SSIM of 0.98. In addition, this division into blocks improved the detection resistance by reducing the rate of detection by 20%. These results prove the efficiency of dividing by blocks to achieve improved embedding capacity, image quality, and security with a strong basis for its implementation in the proposed ACO-LSB steganographic method.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Results and Discussion</title>
<p>The model has been developed on the MATLAB R2023a platform. In the experiment, originally saved in bmb format grayscale images have been used as cover materials. The integrity verification/decoy data and confidential information were concealed by the system through the replacement of the four least significant bits (LSB). The PSNR value, which quantifies the distortion in a steganographic image relative to a clean image, and the detection rate, which represents the proportion of detected altered bytes to the total number of altered bytes during the attack phase, are utilized to evaluate the performance of the proposed model. It is employed in investigative processes to evaluate the capabilities of detection. The outcomes generated by the implemented system for change detection are as follows. List of detected pair comparisons: The list comprises the byte position of every modified byte discovered in a covert image captured during an assault and validated during the extract-verify stage. By comparing the corresponding pairings of bits in the original secret and counterfeit information, the hash is produced. An image is deemed disconnected in the absence of any detection list information. Furthermore, the result of a checksum discrepancy: A checksum is calculated during extraction and subsequently compared to the encoded checksum that was incorporated during embedding. An inconsistency in the checksum result indicates potential tampering with the steganographic image. The MATLAB algorithm produces the image&#x2019;s checksum value.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Experimental Data Set</title>
<p>The proposed approach has been evaluated utilizing the BOSSbase1.01 dataset, which consists of 10,000 8-bit PGM (Portable Graymap Image) grayscale images. BOSSbase1.01 is one of the most reputed datasets related to digital image forensics and steganography research. This dataset was created to compare schemes of steganography and steganalysis, and hence it contains a huge volume of images, mostly gray-scale and with a 512 &#x00D7; 512 pixel resolution, in lossless formats like PNG (Portable Network Graphics) to avoid compression artifacts. It is primarily used to benchmark the embedding of hidden messages within these very images, using different steganographic techniques, and for testing the efficiency of steganalysis methods aimed at detecting the presence of these hidden messages. Therefore, BOSSbase1.01 underlies the bulk of academic research in this area and hence offers a unique possibility for researchers to compare their new methods and technologies in a unique manner. The initial one thousand photographs were chosen from the collection to participate in the endeavor. From the following URL (Uniform Resource Locator), the dataset was accessed on 01 June 2022, <ext-link ext-link-type="uri" xlink:href="https://dde.binghamton.edu/download/">https://dde.binghamton.edu/download/</ext-link>, accessed on 21 July 2024. The Digital Data Embedding Lab at Binghamton University has generated the dataset [<xref ref-type="bibr" rid="ref-27">27</xref>]. With its dimensions of 512 pixels across the width and 512 pixels in height, the image weighs 256 KB. Using the spatial domain LSB method, the confidential image (Girl.bmp) was embedded into each of the one thousand images for the study. One thousand images have been selected from the BOSSbase1.01 dataset. The filename and dimensions of the image &#x201C;Girl. BMP (Bitmap)&#x201D; utilized in the experiment are 59.4 KB and 142 &#x00D7; 142 pixels, respectively. The source of the image was the USC-SIPI Image Database (2023).</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Implementation</title>
<p>Three modules are used to do the trial work. Four-LSB steganography is used by the embedding module to hide the hidden picture among a large group of 1000 grayscale PGM (Portable GreyMap) cover images. The data for the secret image is stored in the two least important bits of each four-bit pair in the stego byte. The first two bits of the right half-byte of the stego byte copy, flip, and save the secret bit pair as fake data. The secret information&#x2019;s checksum value is found and then added to the steganographic picture. The attack module changes the steganographic picture by replacing bits from the right half-bytes, which hold the secret data, with values that are chosen at random from 0 to 15. Looking for a way to attack the steganographic image again [<xref ref-type="bibr" rid="ref-28">28</xref>]. A predetermined quantity of attacked bytes is utilized to enable the evaluation of detection precision through a comparison with the true number of attacks. Extract-Verify is a program that extracts a secret image and verifies its integrity concurrently through pairwise comparisons of secret and decoy bits and checksums. This module is responsible for performing the checksum comparison by matching the embedded checksum value with the checksum value generated during the extraction process. The module will also be used to create a catalog of locations in the extracted secret image where altered bytes have been detected [<xref ref-type="bibr" rid="ref-29">29</xref>]. Division of the carrier image and the secret image into four blocks in the process of embedding enhances the effectiveness and efficiency of the steganographic method. Such division is necessary for several reasons, including increasing manageability. A more manageable division would therefore mean finer control over the processes of embedding and extraction, reducing the chance of errors and hence a high accuracy in concealing data. It enhances the security of the scheme because, due to this, the hidden data will now be spread over different parts of the carrier image, complicating the possibility of detection of any pattern or anomaly in the steganalysis techniques for hidden data. Moreover, it ensures optimum utilization of computational resources with small blocks so that the Ant Colony Optimization algorithm can process them fast and explore the potential positions for embedding within each block. This localized optimization helps achieve higher embedding capacities while preserving image quality.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Results and Discussion</title>
<p>As illustrated in <xref ref-type="fig" rid="fig-7">Fig. 7</xref>, the experiment entailed embedding the covert image (Girl.bmp) within one thousand grayscale images extracted from the BOSSbase1.01 dataset. The embedding procedure was executed in tripartite succession: initially, a direct decoy was inserted alongside the secret data; subsequently, an inverted decoy was inserted alongside the secret data, and finally, the secret data itself was embedded in the absence of a decoy as shown in <xref ref-type="fig" rid="fig-7">Fig. 7</xref>.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>The secret image</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-7.tif"/>
</fig>
<p><xref ref-type="table" rid="table-4">Table 4</xref> displays the three PSNR values for the first 30 photos in the collection. The mean PSNR value for all 1000 photos is computed and presented in <xref ref-type="table" rid="table-5">Table 5</xref>. The PSNR for embedding without a decoy is much greater than the PSNR of the suggested approach and optimal capacity expansion since the PSNR3 case substituted just 2 bits per byte compared to 4 bits in the recommended cases [<xref ref-type="bibr" rid="ref-30">30</xref>]. The peak signal-to-noise ratio (PNSR) of the increased capacity exceeds the PSNR of the reference method. This indicates that the proposed method offers improved invisibility and a more efficient way to hide confidential information.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>PSNR values for 30 images</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Cover image</th>
<th>PSNR embedding without decoy</th>
<th>PSNR for PSO-LSB [<xref ref-type="bibr" rid="ref-31">31</xref>] approach</th>
<th>PSNR for proposed approach ACO-LSB</th>
<th>PSNR for the proposed capacity expansion approach</th>
</tr>
</thead>
<tbody>
<tr>
<td>Girl.bmb 1</td>
<td>43.1768</td>
<td>32.7456</td>
<td>29.2348</td>
<td>30.799</td>
</tr>
<tr>
<td>Girl.bmb 2</td>
<td>43.177</td>
<td>32.746</td>
<td>29.235</td>
<td>30.768</td>
</tr>
<tr>
<td>Girl.bmb 3</td>
<td>42.961</td>
<td>32.418</td>
<td>29.206</td>
<td>30.737</td>
</tr>
<tr>
<td>Girl.bmb 4</td>
<td>42.746</td>
<td>32.094</td>
<td>29.176</td>
<td>30.706</td>
</tr>
<tr>
<td>Girl.bmb 5</td>
<td>42.532</td>
<td>31.773</td>
<td>29.147</td>
<td>30.676</td>
</tr>
<tr>
<td>Girl.bmb 6</td>
<td>42.320</td>
<td>31.455</td>
<td>29.118</td>
<td>30.645</td>
</tr>
<tr>
<td>Girl.bmb 7</td>
<td>42.108</td>
<td>31.141</td>
<td>29.089</td>
<td>30.614</td>
</tr>
<tr>
<td>Girl.bmb 8</td>
<td>41.898</td>
<td>30.829</td>
<td>29.060</td>
<td>30.584</td>
</tr>
<tr>
<td>Girl.bmb 9</td>
<td>41.688</td>
<td>30.521</td>
<td>29.031</td>
<td>30.553</td>
</tr>
<tr>
<td>Girl.bmb 10</td>
<td>41.480</td>
<td>30.216</td>
<td>29.002</td>
<td>30.522</td>
</tr>
<tr>
<td>Girl.bmb 11</td>
<td>41.272</td>
<td>29.914</td>
<td>28.973</td>
<td>30.492</td>
</tr>
<tr>
<td>Girl.bmb 12</td>
<td>41.066</td>
<td>29.615</td>
<td>28.944</td>
<td>30.461</td>
</tr>
<tr>
<td>Girl.bmb 13</td>
<td>40.861</td>
<td>29.318</td>
<td>28.915</td>
<td>30.431</td>
</tr>
<tr>
<td>Girl.bmb 14</td>
<td>40.656</td>
<td>29.025</td>
<td>28.886</td>
<td>30.401</td>
</tr>
<tr>
<td>Girl.bmb 15</td>
<td>40.453</td>
<td>28.735</td>
<td>28.857</td>
<td>30.370</td>
</tr>
<tr>
<td>Girl.bmb 16</td>
<td>40.251</td>
<td>28.448</td>
<td>28.828</td>
<td>30.340</td>
</tr>
<tr>
<td>Girl.bmb 17</td>
<td>40.049</td>
<td>28.163</td>
<td>28.799</td>
<td>30.309</td>
</tr>
<tr>
<td>Girl.bmb 18</td>
<td>39.849</td>
<td>27.881</td>
<td>28.771</td>
<td>30.279</td>
</tr>
<tr>
<td>Girl.bmb 19</td>
<td>39.650</td>
<td>27.603</td>
<td>28.742</td>
<td>30.249</td>
</tr>
<tr>
<td>Girl.bmb 20</td>
<td>39.452</td>
<td>27.327</td>
<td>28.713</td>
<td>30.219</td>
</tr>
<tr>
<td>Girl.bmb 21</td>
<td>39.254</td>
<td>27.053</td>
<td>28.684</td>
<td>30.188</td>
</tr>
<tr>
<td>Girl.bmb 22</td>
<td>39.058</td>
<td>26.783</td>
<td>28.656</td>
<td>30.158</td>
</tr>
<tr>
<td>Girl.bmb 23</td>
<td>38.863</td>
<td>26.515</td>
<td>28.627</td>
<td>30.128</td>
</tr>
<tr>
<td>Girl.bmb 24</td>
<td>38.669</td>
<td>26.250</td>
<td>28.598</td>
<td>30.098</td>
</tr>
<tr>
<td>Girl.bmb 25</td>
<td>38.475</td>
<td>25.987</td>
<td>28.570</td>
<td>30.068</td>
</tr>
<tr>
<td>Girl.bmb 26</td>
<td>38.283</td>
<td>25.728</td>
<td>28.541</td>
<td>30.038</td>
</tr>
<tr>
<td>Girl.bmb 27</td>
<td>38.091</td>
<td>25.470</td>
<td>28.513</td>
<td>30.008</td>
</tr>
<tr>
<td>Girl.bmb 28</td>
<td>37.901</td>
<td>25.216</td>
<td>28.484</td>
<td>29.978</td>
</tr>
<tr>
<td>Girl.bmb 29</td>
<td>37.711</td>
<td>24.963</td>
<td>28.456</td>
<td>29.948</td>
</tr>
<tr>
<td>Girl.bmb 30</td>
<td>37.523</td>
<td>24.714</td>
<td>28.427</td>
<td>29.918</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Average PSNR values for 1000 stego images</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>PSNR embedding without decoy</th>
<th>PSNR for [<xref ref-type="bibr" rid="ref-31">31</xref>] approach</th>
<th>PSNR for proposed approach</th>
<th>PSNR for proposed capacity expansion approach</th>
</tr>
</thead>
<tbody>
<tr>
<td>43.07699</td>
<td>33.42934</td>
<td>29.5795</td>
<td>31.71444</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The ACO-LSB method focuses on a balance between embedding capacity, image quality, and detection resistance across a broad range of scenarios. While literature [<xref ref-type="bibr" rid="ref-31">31</xref>] may excel in specific conditions, the ACO-LSB method aims to provide robust performance consistently across various types of images and embedding environments. We conducted additional experiments comparing the ACO-LSB method with several recent steganographic techniques published in the latest literature. The metrics were considered: embedding capacity, PSNR, SSIM, and detection resistance. The detection resistance of the ACO-LSB method was particularly notable, reducing the detection rate by 15% compared to the latest methods, underscoring its robustness against steganalysis.</p>
<p><xref ref-type="fig" rid="fig-8">Fig. 8a</xref> illustrates a pristine cover image, while <xref ref-type="fig" rid="fig-8">Fig. 8b</xref> depicts a steganographic image, and <xref ref-type="fig" rid="fig-8">Fig. 8c</xref> presents an enhanced capacity image. Even after the 4 LSB replacement, no evident differentiation remains between the clean and steganographic images. There is no discernible difference between the stego image with increased capacity and the original stego image. In order to prevent any discrepancies in the images, an alternative embedding technique was implemented: the data decoy pairings were encoded in alternate bytes utilizing 2 LSB. The steganographic image generated via alternate embedding, employing the cover data image Bird.jpg as illustrated in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. When compared to the 4 LSB technique, the utmost secret data size is reduced by 50% when alternate embedding is utilized.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Stego image with (a) clean image, figure, (b) proposed approach, and (c) proposed expanded capacity</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-8.tif"/>
</fig>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Attack Detection Results</title>
<p>Each of the proposed steganographic images was altered by adding 51,200 bytes. The 4 least significant bits of the bytes were replaced with random values between 0 and 15. The Extract-Verify application was used to analyze one thousand modified steganographic images to extract the hidden secret message and detect any integrity breaches. Following the assault, the confidential image that was obtained is shown in <xref ref-type="fig" rid="fig-9">Fig. 9</xref>. The assault is clearly visible when analyzing the extracted image, which is a prominent example of an altered document [<xref ref-type="bibr" rid="ref-32">32</xref>]. However, in practical scenarios, attacks on papers could potentially go undetected due to variations in format and content.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>The extracted secret image after the attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_55195-fig-9.tif"/>
</fig>
<p>The detection rate for the initial 30 images was processed using the pair comparison method. A portion of the total assaults on the steganographic images comprised 12,800 bytes, of which one-fourth was devoted to the secret image. A distinct byte was utilized to store each pair of bits of the secret byte. When the pair comparison method was unable to identify the attacks, the checksum comparison method demonstrated efficacy.</p>
<p>When describing the secret information embedding step, the checksum is a crucial component for ensuring the integrity and accuracy of the embedded data. It is a value calculated from the secret data before its embedding, which is later used for verification at the extraction stage. The checksum enables the checking of hidden data for errors or modifications during its transmission or storage. as shown in <xref ref-type="table" rid="table-6">Table 6</xref> explains a comprehensive evaluation of the proposed ACO-LSB steganographic method.</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>A more comprehensive evaluation of the proposed ACO-LSB steganographic method</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Measure</th>
<th>Definition</th>
<th>Value (Proposed method)</th>
<th>Value (Literature [<xref ref-type="bibr" rid="ref-31">31</xref>])</th>
<th>Comparison</th>
</tr>
</thead>
<tbody>
<tr>
<td>Embedding capacity</td>
<td>Amount of data embedded without significant degradation (bits)</td>
<td>30% increase</td>
<td>Standard</td>
<td>Higher capacity in the proposed method</td>
</tr>
<tr>
<td>PSNR (dB)</td>
<td>Peak signal-to-noise ratio, measures image quality</td>
<td>40.5</td>
<td>38.0</td>
<td>Better image quality in the proposed method</td>
</tr>
<tr>
<td>SSIM</td>
<td>Structural similarity index measure assesses image similarity</td>
<td>0.98</td>
<td>0.95</td>
<td>Higher similarity in the proposed method</td>
</tr>
<tr>
<td>Bit error rate (BER)</td>
<td>Number of bit errors per unit time or bits transmitted</td>
<td>0.002</td>
<td>0.005</td>
<td>Lower BER in the proposed method</td>
</tr>
<tr>
<td>Embedding efficiency</td>
<td>Ratio of correctly embedded bits to total bits modified</td>
<td>0.95</td>
<td>0.90</td>
<td>Higher efficiency in the proposed method</td>
</tr>
<tr>
<td>Payload capacity</td>
<td>Total amount of data that can be embedded (bits)</td>
<td>50,000</td>
<td>35,000</td>
<td>Higher capacity in the proposed method</td>
</tr>
<tr>
<td>Execution time</td>
<td>Time taken for embedding and extraction processes (seconds)</td>
<td>5.2</td>
<td>6.8</td>
<td>Faster execution in the proposed method</td>
</tr>
<tr>
<td>Detection accuracy</td>
<td>Ability to evade steganalysis techniques (detection rate %)</td>
<td>15%</td>
<td>30%</td>
<td>Lower detection rate in the proposed method</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Extract-Verify uses pair comparison and gives a listing of the locations and contents of the modified bytes. <xref ref-type="table" rid="table-7">Table 7</xref> shows some locations and contents of modified bytes of the first image in the dataset Girl.bmb 1. Using this list of modified bytes, one can get an idea of the patterns of the attacks that most frequently occur.</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>The list of locations of attacked bytes using pair comparison</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Cover image</th>
<th>Detected attack bytes on stego</th>
<th>Detected attack bytes on secret image</th>
<th>Detected attack bytes on secret image after expansion</th>
<th>Detection rate</th>
</tr>
</thead>
<tbody>
<tr>
<td>Girl.bmb 1</td>
<td>38,412</td>
<td>12,748</td>
<td>12,600</td>
<td>0.984375</td>
</tr>
<tr>
<td>Girl.bmb 2</td>
<td>38,600</td>
<td>12,745</td>
<td>12,530</td>
<td>0.978906</td>
</tr>
<tr>
<td>Girl.bmb 3</td>
<td>38,678</td>
<td>12,675</td>
<td>12,200</td>
<td>0.953125</td>
</tr>
<tr>
<td>Girl.bmb 4</td>
<td>38,874</td>
<td>12,733</td>
<td>12,680</td>
<td>0.990625</td>
</tr>
<tr>
<td>Girl.bmb 5</td>
<td>38,964</td>
<td>12,634</td>
<td>12,200</td>
<td>0.953125</td>
</tr>
<tr>
<td>Girl.bmb 6</td>
<td>38,489</td>
<td>12,723</td>
<td>12,350</td>
<td>0.964844</td>
</tr>
<tr>
<td>Girl.bmb 7</td>
<td>38,234</td>
<td>12,635</td>
<td>12,320</td>
<td>0.9625</td>
</tr>
<tr>
<td>Girl.bmb 8</td>
<td>38,603</td>
<td>12,711</td>
<td>11,900</td>
<td>0.929688</td>
</tr>
<tr>
<td>Girl.bmb 9</td>
<td>38,935</td>
<td>12,745</td>
<td>11,800</td>
<td>0.921875</td>
</tr>
<tr>
<td>Girl.bmb 10</td>
<td>38,094</td>
<td>12,634</td>
<td>11,820</td>
<td>0.923438</td>
</tr>
<tr>
<td>Girl.bmb 11</td>
<td>38,745</td>
<td>12,654</td>
<td>11,740</td>
<td>0.917188</td>
</tr>
<tr>
<td>Girl.bmb 12</td>
<td>38,846</td>
<td>12,565</td>
<td>12,300</td>
<td>0.960938</td>
</tr>
<tr>
<td>Girl.bmb 13</td>
<td>38,564</td>
<td>12,703</td>
<td>11,450</td>
<td>0.894531</td>
</tr>
<tr>
<td>Girl.bmb 14</td>
<td>38,434</td>
<td>12,734</td>
<td>11,230</td>
<td>0.877344</td>
</tr>
<tr>
<td>Girl.bmb 15</td>
<td>38,795</td>
<td>12,721</td>
<td>12,140</td>
<td>0.948438</td>
</tr>
<tr>
<td>Girl.bmb 16</td>
<td>38,312</td>
<td>12,734</td>
<td>10,900</td>
<td>0.851563</td>
</tr>
<tr>
<td>Girl.bmb 17</td>
<td>38,379</td>
<td>12,600</td>
<td>11,800</td>
<td>0.921875</td>
</tr>
<tr>
<td>Girl.bmb 18</td>
<td>38,936</td>
<td>12,546</td>
<td>11,460</td>
<td>0.895313</td>
</tr>
<tr>
<td>Girl.bmb 19</td>
<td>38,023</td>
<td>12,544</td>
<td>11,230</td>
<td>0.877344</td>
</tr>
<tr>
<td>Girl.bmb 20</td>
<td>38,187</td>
<td>12,654</td>
<td>11,560</td>
<td>0.903125</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The proposed ACO-LSB steganographic method thus has high resistance to steganalysis, and hence, the techniques of detection find it very hard to discover the hidden data from an image. This strength can be attributed to several important features that have been incorporated into the methodology. First, the adaptive searching provided by the Ant Colony Optimization algorithm makes it dynamically select the optimal positions of the pixels for embedding data. This adaptivity of the algorithm reduces the predictability of the embedding patterns and hence makes it harder for steganalysis algorithms to detect the hidden information. Furthermore, the pheromone update mechanism in the ACO algorithm will refine the selection of the embedding position iteratively so that data will be embedded in such a manner that detectable anomalies are reduced to a minimum. All of these readaptations can help retain as much as possible of the natural statistical properties of the cover image, thereby further complicating the efforts of detection.</p>
<p>While having its different strengths, the ACO-LSB technique has some limitations. One major limitation is the additional complexity and computational cost resulting from the use of the ACO algorithm. The processes of embedding and extraction demand costly computational resources; this might be a weakness where resources are limited or when real-time processing is required. Another limitation is that it depends on the characteristics of the cover image. The method&#x2019;s effectiveness can depend on the uniformity and texture of the cover image. Scenarios with low texture or uniform areas in the image provide fewer optimal embedding positions, hence probably reducing method capacity and security. Also, the performance of the technique under hostile conditions like huge compression of the stego-image or high noise levels is not fully known. These conditions could also affect the ability to embed, and the precision of data extraction, and most likely cause challenges in real-world applications regarding the reliability of the method.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Conclusion</title>
<p>This research work demonstrates the capacity-enhancing powers of the ACO with LSB in image steganography. The proposed method optimally utilizes the collaborative and flexible features of ACO to embed data in order to increase the embedding capacity characterized by high-quality images and resistance to detection. It has now come as unanimous experimental proof that the systems proposed with ACO incorporate an improvement within the capacity of the systems with traditional steganographic techniques. The average capacity enhancement shown by our technology is 34% as compared to that of the conventional methods, that is, the case of Least Significant Bit (LSB) with ACO techniques. The study achieved a maximum of 2.5 bits per pixel without seriously compromising image quality. Conventional approaches often achieve a maximum of around 2.0 bits per pixel under similar conditions. High-quality implantation results are ensured through measurements of capacitance and imperceptibility and compared with PSNR measures of the PSO-LSB approach. The technique improves the capacity of embedding by using iterative refinement and adjusting the pheromone matrix. ACO integration in image steganography significantly boosts data concealment capabilities. Future work can focus on optimizing the computational efficiency of the ACO-LSB method and enhancing its performance under adverse conditions such as high compression and noise levels. Additionally, exploring hybrid approaches that combine ACO-LSB with other steganographic techniques could further improve security and embedding capacity.</p>
</sec>
</body>
<back>
<ack>
<p>The authors would like to acknowledge the support of Altinbas University, Istanbul, Turkey for their valuable support.</p>
</ack>
<sec><title>Funding Statement</title>
<p>The research received no funding grant from any funding agency in the public, commercial, or not-for-profit sectors.</p>
</sec>
<sec><title>Author Contributions</title>
<p>Conceptualization, Sefer Kurnaz; methodology, Zinah Khalid Jasim Jasim; Soft-ware, Zinah Khalid Jasim Jasim; validation, Zinah Khalid Jasim Jasim; Formal analysis, Zinah Khalid Jasim Jasim; Writing&#x2013;original draft preparation. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>The images are collected from a publicly available dataset from here: V. Holub. Content Adaptive Steganography&#x2013;Design and Detection (Ph.D. thesis), Binghamton University, May 2014, in the current study are available from the first author upon reasonable request.</p>
</sec>
<sec><title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Shankar</surname></string-name> and <string-name><given-names>E.</given-names> <surname>Perumal</surname></string-name></person-group>, &#x201C;<article-title>Ant colony optimization based optimal steganography technique for secret image sharing scheme</article-title>,&#x201D; <source>Adv. Math.: Sci. J.</source>, vol. <volume>10</volume>, no. <issue>1</issue>, pp. <fpage>453</fpage>&#x2013;<lpage>461</lpage>, <year>Jan. 2021</year>. doi: <pub-id pub-id-type="doi">10.37418/amsj.10.1.45</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Sindhuja</surname></string-name></person-group>, &#x201C;<article-title>Ant colony optimization based grouped origin routing (ACGOR) technique using trustable node convention algorithm in manet</article-title>,&#x201D; <source>J. Adv. Res. Dyn. Control Syst.</source>, vol. <volume>12</volume>, no. <issue>4</issue>, pp. <fpage>474</fpage>&#x2013;<lpage>485</lpage>, <year>Apr. 2020</year>. doi: <pub-id pub-id-type="doi">10.5373/JARDCS/V12I4/20201909</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Piya</surname></string-name></person-group>, &#x201C;<article-title>High capacity and optimized image steganography technique based on ant colony optimization algorithm</article-title>,&#x201D; <source>Int. J. Inf. Syst. Comput. Sci.</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>15</fpage>, <year>May 2019</year>. doi: <pub-id pub-id-type="doi">10.56327/ijiscs.v3i1.720</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J. M.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X. F.</given-names> <surname>Zhao</surname></string-name>, <string-name><given-names>X. L.</given-names> <surname>He</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Improving the robustness of JPEG steganography with robustness cost</article-title>,&#x201D; in <conf-name>IEEE Signal Process. Lett.</conf-name>, <year>2022</year>, vol. <volume>29</volume>, pp. <fpage>164</fpage>&#x2013;<lpage>168</lpage>. doi: <pub-id pub-id-type="doi">10.1109/LSP.2021.3129419</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Bhandari</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Panday</surname></string-name>, <string-name><given-names>C. P.</given-names> <surname>Bhatta</surname></string-name>, and <string-name><given-names>S. P.</given-names> <surname>Panday</surname></string-name></person-group>, &#x201C;<article-title>Image steganography approach based ant colony optimization with triangular chaotic map</article-title>,&#x201D; in <conf-name>2022 2nd Int. Conf. Innov. Pract. Technol. Manag. (ICIPTM)</conf-name>, <publisher-loc>Pradesh, India</publisher-loc>, <year>Feb. 2022</year>. doi: <pub-id pub-id-type="doi">10.1109/iciptm54933.2022.9753917</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Kadhim</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Premaratne</surname></string-name>, <string-name><given-names>P. J.</given-names> <surname>Vial</surname></string-name>, and <string-name><given-names>B.</given-names> <surname>Halloran</surname></string-name></person-group>, &#x201C;<article-title>Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research</article-title>,&#x201D; <source>Neurocomputing</source>, vol. <volume>335</volume>, pp. <fpage>299</fpage>&#x2013;<lpage>326</lpage>, <year>Mar. 2019</year>. doi: <pub-id pub-id-type="doi">10.1016/j.neucom.2018.06.075</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. K.</given-names> <surname>Ghosal</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Chatterjee</surname></string-name>, and <string-name><given-names>R.</given-names> <surname>Sarkar</surname></string-name></person-group>, &#x201C;<article-title>Image steganography based on Kirsch edge detection</article-title>,&#x201D; <source>Multimed. Syst.</source>, vol. <volume>27</volume>, no. <issue>1</issue>, pp. <fpage>73</fpage>&#x2013;<lpage>87</lpage>, <year>Feb. 2021</year>. doi: <pub-id pub-id-type="doi">10.1007/s00530-020-00703-3</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. A.</given-names> <surname>Loan</surname></string-name>, <string-name><given-names>N. N.</given-names> <surname>Hurrah</surname></string-name>, <string-name><given-names>S. A.</given-names> <surname>Parah</surname></string-name>, <string-name><given-names>J. W.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>J. A.</given-names> <surname>Sheikh</surname></string-name> and <string-name><given-names>G. M.</given-names> <surname>Bhat</surname></string-name></person-group>, &#x201C;<article-title>Secure and robust digital image watermarking using coefficient differencing and chaotic encryption</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>6</volume>, pp. <fpage>19876</fpage>&#x2013;<lpage>19897</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2018.2808172</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. A. El</given-names> <surname>Rahman</surname></string-name></person-group>, &#x201C;<article-title>A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information</article-title>,&#x201D; <source>Comput. Electr. Eng.</source>, vol. <volume>70</volume>, pp. <fpage>380</fpage>&#x2013;<lpage>399</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1016/j.compeleceng.2016.09.001</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Himthani</surname></string-name>, <string-name><given-names>V. S.</given-names> <surname>Dhaka</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kaur</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Rani</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Oza</surname></string-name> and <string-name><given-names>H. N.</given-names> <surname>Lee</surname></string-name></person-group>, &#x201C;<article-title>Comparative performance assessment of deep learning based image steganography techniques</article-title>,&#x201D; <source>Sci. Rep.</source>, vol. <volume>12</volume>, no. <issue>1</issue>, <year>Dec. 2022</year>, Art. no. <fpage>16895</fpage>. doi: <pub-id pub-id-type="doi">10.1038/s41598-022-17362-1</pub-id>; <pub-id pub-id-type="pmid">36207314</pub-id></mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O. J.</given-names> <surname>Ibrahim</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Zidan</surname></string-name>, <string-name><given-names>B. R.</given-names> <surname>Al-Doori</surname></string-name>, <string-name><given-names>M. Q.</given-names> <surname>Taha</surname></string-name>, and <string-name><given-names>N. E.</given-names> <surname>Islam</surname></string-name></person-group>, &#x201C;<article-title>Image transmission technique via mosaic image steganography</article-title>,&#x201D; <source>Int. J. Sci. Res. (IJSR)</source>, vol. <volume>5</volume>, no. <issue>5</issue>, pp. <fpage>747</fpage>&#x2013;<lpage>750</lpage>, <year>May 2015</year>. doi: <pub-id pub-id-type="doi">10.21275/v5i5.NOV163386</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Ding</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Yu</surname></string-name></person-group>, &#x201C;<article-title>Provably secure public-key steganography based on elliptic curve cryptography</article-title>,&#x201D; in <conf-name>IEEE Trans. Inf. Forensics Secur.</conf-name>, <year>2024</year>, vol. <volume>19</volume>, pp. <fpage>3148</fpage>&#x2013;<lpage>3163</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TIFS.2024.3361219</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D. R. I. M.</given-names> <surname>Setiadi</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Rustad</surname></string-name>, <string-name><given-names>P. N.</given-names> <surname>Andono</surname></string-name>, and <string-name><given-names>G. F.</given-names> <surname>Shidik</surname></string-name></person-group>, &#x201C;<article-title>Digital image steganography survey and investigation (Goal, assessment, method, development, and dataset)</article-title>,&#x201D; in <conf-name>Signal Process.</conf-name>, <publisher-name>Elsevier B.V</publisher-name>, <year>May 01, 2023</year>, vol. <volume>206</volume>. doi: <pub-id pub-id-type="doi">10.1016/j.sigpro.2022.108908</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Luo</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Zheng</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Huang</surname></string-name></person-group>, &#x201C;<article-title>A new adversarial embedding method for enhancing image steganography</article-title>,&#x201D; <source>IEEE Trans. Inf. Forensics Secur.</source>, vol. <volume>16</volume>, pp. <fpage>4621</fpage>&#x2013;<lpage>4634</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TIFS.2021.3111748</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kalita</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Tuithung</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Majumder</surname></string-name></person-group>, &#x201C;<article-title>An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique</article-title>,&#x201D; <source>Cryptologia</source>, vol. <volume>43</volume>, no. <issue>5</issue>, pp. <fpage>414</fpage>&#x2013;<lpage>437</lpage>, <year>Sep. 2019</year>. doi: <pub-id pub-id-type="doi">10.1080/01611194.2019.1579122</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. Q.</given-names> <surname>Taha</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kurnaz</surname></string-name></person-group>, &#x201C;<article-title>Image steganography using modified DWT technique</article-title>,&#x201D; <source>Int. J. Food Nutr. Sci.</source>, vol. <volume>11</volume>, no. <issue>12</issue>. <year>Apr. 2023</year>. doi: <pub-id pub-id-type="doi">10.48047/ijfans/v11/i12/212</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Pramanik</surname></string-name></person-group>, &#x201C;<article-title>An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>82</volume>, no. <issue>22</issue>, pp. <fpage>34287</fpage>&#x2013;<lpage>34319</lpage>, <year>Sep. 2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-023-14505-y</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Li</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Luo</surname></string-name></person-group>, &#x201C;<article-title>Cost reassignment for improving security of adaptive steganography using an artificial immune system</article-title>,&#x201D; <source>IEEE Signal Process. Lett.</source>, vol. <volume>29</volume>, pp. <fpage>1564</fpage>&#x2013;<lpage>1568</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1109/LSP.2022.3188174</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Naseer</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Jamal</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Hussain</surname></string-name></person-group>, &#x201C;<article-title>Cryptographically strong S-P boxes and their application in steganography</article-title>,&#x201D; <source>J. Inf. Secur. Appl.</source>, vol. <volume>67</volume>, <year>Jun. 2022</year>, Art. no. <fpage>103174</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jisa.2022.103174</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Kaneria</surname></string-name> and <string-name><given-names>Dr V.</given-names> <surname>Jotwani</surname></string-name></person-group>, &#x201C;<article-title>Comparative performance analysis of deep learning-based image steganography using U-Net, V-Net, And U-Net&#x002B;&#x002B; encoders</article-title>,&#x201D; <source>J. Adv. Zool.</source>, vol. <volume>18</volume>, no. <issue>4</issue>, pp. <fpage>310</fpage>&#x2013;<lpage>319</lpage>, <year>Mar. 2024</year>. doi: <pub-id pub-id-type="doi">10.53555/jaz.v45i3.4390</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Luo</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yang</surname></string-name>, and <string-name><given-names>F.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Inverse interpolation and its application in robust image steganography</article-title>,&#x201D; <source>IEEE Trans. Circuits Syst. Video Technol.</source>, vol. <volume>32</volume>, no. <issue>6</issue>, pp. <fpage>4052</fpage>&#x2013;<lpage>4064</lpage>, <year>Jun. 2022</year>. doi: <pub-id pub-id-type="doi">10.1109/TCSVT.2021.3107342</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Xiong</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>A. V.</given-names> <surname>Vasilakos</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Luo</surname></string-name></person-group>, &#x201C;<article-title>A siamese inverted residuals network image steganalysis scheme based on deep learning</article-title>,&#x201D; <source>ACM Trans. Multimedia Comput. Commun. Appl.</source>, vol. <volume>19</volume>, no. <issue>6</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>23</lpage>, <year>Jul. 2023</year>. doi: <pub-id pub-id-type="doi">10.1145/3579166</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P. H.</given-names> <surname>Sunitha</surname></string-name> and <string-name><given-names>G. K.</given-names> <surname>Murthy</surname></string-name></person-group>, &#x201C;<article-title>Image steganography using fusion based advanced encryption algorithm and embedding techniques</article-title>,&#x201D; <source>Int. J. Comput. Appl. Technol. Res.</source>, vol. <volume>5</volume>, no. <issue>9</issue>, pp. <fpage>561</fpage>&#x2013;<lpage>567</lpage>, <year>Sep. 2016</year>. doi: <pub-id pub-id-type="doi">10.7753/ijcatr0509.1002</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Prasad</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Pal</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Mukherjee</surname></string-name></person-group>, &#x201C;<article-title>An RGB color image steganography scheme by binary lower triangular matrix</article-title>,&#x201D; <source>IEEE Trans. Intell. Transp. Syst.</source>, vol. <volume>24</volume>, no. <issue>7</issue>, pp. <fpage>6865</fpage>&#x2013;<lpage>6873</lpage>, <year>Jul. 2023</year>. doi: <pub-id pub-id-type="doi">10.1109/TITS.2023.3264467</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Qiu</surname></string-name></person-group>, &#x201C;<article-title>Generative image steganography scheme based on deep learning</article-title>,&#x201D; in <conf-name>2022 Int. Conf. Edu., Netw. Inf. Tech.</conf-name>, <publisher-loc>Liverpool, UK</publisher-loc>, <publisher-name>Institute of Electrical and Electronics Engineers Inc.</publisher-name>, <comment>2022</comment>, pp. <fpage>191</fpage>&#x2013;<lpage>194</lpage>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Das</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Durafe</surname></string-name>, and <string-name><given-names>V.</given-names> <surname>Patidar</surname></string-name></person-group>, &#x201C;<article-title>An efficient lightweight LSB steganography with deep learning steganalysis</article-title>,&#x201D; in <conf-name>Computational Intelligence in Image and Video Processing</conf-name>, <year>Jan. 2023</year>, pp. <fpage>131</fpage>&#x2013;<lpage>154</lpage>. doi: <pub-id pub-id-type="doi">10.1201/9781003218111-7</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Chhikara</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>An information theoretic image steganalysis for LSB steganography</article-title>,&#x201D; <source>Acta Cybernet.</source>, vol. <volume>24</volume>, no. <issue>4</issue>, pp. <fpage>593</fpage>&#x2013;<lpage>612</lpage>, <year>Jul. 2020</year>. doi: <pub-id pub-id-type="doi">10.14232/actacyb.279174</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Sultana</surname></string-name>, <string-name><given-names>A. H. M.</given-names> <surname>Kamal</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Hossain</surname></string-name>, and <string-name><given-names>M. A.</given-names> <surname>Kabir</surname></string-name></person-group>, &#x201C;<article-title>A novel hybrid edge detection and LBP code-based robust image steganography method</article-title>,&#x201D; <source>Future Internet</source>, vol. <volume>15</volume>, no. <issue>3</issue>, <year>Mar. 2023</year>. doi: <pub-id pub-id-type="doi">10.3390/fi15030108</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Sabeti</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Sobhani</surname></string-name>, and <string-name><given-names>S. M. H.</given-names> <surname>Hasheminejad</surname></string-name></person-group>, &#x201C;<article-title>An adaptive image steganography method based on integer wavelet transform using genetic algorithm</article-title>,&#x201D; <source>Comp. Electri. Engi.</source>, vol. <volume>99</volume>, <year>Apr. 2022</year>, Art. no. <fpage>107809</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.compeleceng.2022.107809</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Osman</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Din</surname></string-name>, and <string-name><given-names>M. R.</given-names> <surname>Idrus</surname></string-name></person-group>, &#x201C;<article-title>Capacity performance of steganography method in text based domain</article-title>,&#x201D; <source>ARPN J. Engi. Appl. Sci.</source>, vol. <volume>10</volume>, no. <issue>3</issue>, pp. <fpage>1345</fpage>&#x2013;<lpage>1351</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Jaradat</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Taqieddin</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Mowafi</surname></string-name></person-group>, &#x201C;<article-title>A high-capacity image steganography method using chaotic particle swarm optimization</article-title>,&#x201D; <source>Secur. Commun. Netw.</source>, vol. <volume>2021</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>11</lpage>, <year>Jun. 2021</year>. doi: <pub-id pub-id-type="doi">10.1155/2021/6679284</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Zeng</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Jing</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Advanced image steganography using a U-Net-based architecture with multi-scale fusion and perceptual loss</article-title>,&#x201D; <source>Electronics</source>, vol. <volume>12</volume>, no. <issue>18</issue>, <year>Sep. 2023</year>, Art. no. <fpage>3808</fpage>. doi: <pub-id pub-id-type="doi">10.3390/electronics12183808</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>