UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
Steganography is a form of technology utilised to safeguard secret data during communication in addition to data repository. Numerous researchers have endeavoured to enhance the performance of steganography techniques through the development of an effective algorithm for the selection of the optimal pixel location within the host image for the concealment of secret bits, for the enhancement of the embedding capacity of the secret data, and for maintaining the visual quality of the host image (stego image) in an accepted rate after the concealment of the secret data. Therefore, steganography is perceived as a challenging task. Thus, the current study proposes a new technique for image steganography based on particle swarm optimisation (PSO) algorithm by using pixel selection for the concealment of a secret image in spatial domain, for the purpose of high embedment capacity. The stego possesses a high level of resistance against a steganalytic attack due to the security provided via image steganography. The function of PSO algorithm is to choose an optimal pixel in grey scale host image for the concealment of secret bits, as the PSO has the ability to achieve an efficient fitness calculation that depends on the cost matrix by dividing the host and secret images into four parts. First of all, the secret bits are modified, which are then embedded within the host image. Several locations in the host image are determined through the order of scanning the host pixels and starting point of the scanning for better least significant bits LSBs of each pixel. The PSO algorithm was utilised to ascertain the ideal initiating point and scanning order. Experimental results show that (1) the average peak signal to noise ratio PSNR value in the benchmark technique based on genetic algorithm for five standard stego images is 45.13%, whereas the result obtained from the recommended technique is 56.60%. (2) The proposed technique has an advantage over the benchmark with a percentage of 33.34%, which encompasses all associated issues within the checklist scenario. Therefore, the performance of the recommended technique is superior over existing techniques. |
References |
[1] B. B. Zaidan, A. A. Zaidan, and M. L. M. Kiah, ‘‘Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns,’’Int. J. Pharmacol., vol. 7, no. 3, pp. 382–387, 2011. [2] H. O. Alanazi, M. L. M. Kiah, A. A. Zaidan, B. B. Zaidan, and G. M. Alam, ‘‘Secure topology for electronic medical record transmissions,’’ Int. J. Pharmacol., vol. 6, no. 6, pp. 954–958, 2010. [3] B. B. Zaidan, A. A. Zaidan, O. H. Alanzani, and R. Alnaqeib, ‘‘Towards corrosion detection system,’’ Int. J. Comput. Sci., vol. 7, no. 3, pp. 33–36, 2010. [4] A. Taqa, A. A. Zaidan, and B. B. Zaidan, ‘‘New framework for high secure data hidden in the MPEG using AES encryption algorithm,’’ Int. J. Comput. Elect. Eng., vol. 1, no. 5, pp. 566–571, 2009. [5] A. W. Naji, S. A. Hameed, W. F. Al-khateeb, O. O. Khalifa, and T. S. Gunawan, ‘‘Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques,’’ Int. J. Comput. Sci. Inf. Secur., vol. 3, no. 1, pp. 1–6, 2009. [6] M. S. A. Nabi, M. L. M. Kiah, B. B. Zaidan, A. A. Zaidan, and G. M. Alam, ‘‘Suitability of SOAP protocol in securing transmissions of EMR database,’’ Int. J. Pharmacol., vol. 6, no. 6, pp. 959–964, 2010. [7] G. M. Alam, M. L. M. Kiah, B. B. Zaidan, A. A. Zaidan, and H. O. Alanazi, ‘‘Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study,’’ Sci. Res. Essays, vol. 5, no. 21, pp. 3254–3260, 2010. [8] A. K. Hmood, Z. M. Kasirun, H. A. Jalab, G. M. Alam, A. A. Zaidan, and B. B. Zaidan, ‘‘On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates,’’ Int. J. Phys. Sci., vol. 5, no. 7, pp. 1054–1062, 2010. [9] H. Alanazi, R. M. Noor, B. B. Zaidan, and A. A. Zaidan, ‘‘Intrusion detection system: Overview,’’ J. Comput., vol. 2, no. 3, pp. 1–5, 2010. [10] H. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, ‘‘New comparative study between DES, 3DES and AES within nine factors,’’ J. Comput., vol. 2, no. 3, pp. 1–5, 2010. [11] M. Abomhara, O. Zakaria, O. O. Khalifa, A. A. Zaidan, and B. B. Zaidan, ‘‘Enhancing selective encryption for H.264/AVC using advanced encryption standard,’’ Int. J. Comput. Elect. Eng., vol. 2, no. 2, p. 223, 2010. [12] B. B. Zaidan, A. A. Zaidan, and H. Mwafak, ‘‘New comprehensive study to assess comparatively the QKD, XKMS, KDM in the PKI encryption algorithms,’’ Int. J. Comput. Sci. Eng., vol. 1, no. 3, pp. 263–268, 2009. [13] H. O. Alanazi, G. M. Alam, B. B. Zaidan, and A. A. Zaidan, ‘‘Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance,’’ J. Med. Plants Res., vol. 4, no. 19, pp. 2059–2074, 2010. [14] M. S. Nabi, M. L. M. Kiah, A. A. Zaidan, and B. B. Zaidan, ‘‘Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records,’’ in Proc. 2nd Int. Conf. Future Gener. Commun. Technol. (FGCT), Nov. 2013, pp. 93–97. [15] O. Enaizan, A. A. Zaidan, NH M. Alwi, B. B. Zaidan, M. A. Alsalem, O. S. Albahri, and A. S. Albahri, ‘‘Electronic medical record systems: Decision support examination framework for individual, security and privacy concerns using multi-perspective analysis,’’ Health Technol., pp. 1–28, Nov. 2018. [16] M. Hussain, A. A. Zaidan, B. B. Zidan, S. Iqbal, M. M. Ahmed, O. S. Albahri, and A. S. Albahri, ‘‘Conceptual framework for the security of mobile health applications on Android platform,’’ Telemat. Inform., vol. 35, no. 5, pp. 1335–1354, 2018. [17] H. O. Alanazi, A. A. Zaidan, B. B. Zaidan, M. L. M. Kiah, and S. H. Al-Bakri, ‘‘Meeting the security requirements of electronic medical records in the ERA of high-speed computing,’’ J. Med. Syst., vol. 39, no. 1, p. 165, 2015. [18] M. Hussain, A. Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. Kiah, S. Iqbal, S. Iqbal, and M. Abdulnabi, ‘‘A security framework for mHealth apps on Android platform,’’ Comput. Secur., vol. 75, pp. 191–217, Jun. 2018. [19] S. Iqbal, M. L. M. Kiah, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, and M. A. Alsalem, ‘‘Real-time-based E-health systems: Design and implementation of a lightweight key management protocol for securing sensitive information of patients,’’ Health Technol., vol. 9, no. 2, pp. 93–111, Aug. 2018. [20] B. B. Zaidan, A. Haiqi, A. A. Zaidan, M. Abdulnabi, M. L. M. Kiah, and H. Muzamel, ‘‘A security framework for nationwide health information exchange based on telehealth strategy,’’ J. Med. Syst., vol. 39, no. 5, p. 51, 2015. [21] M. Hussain, ‘‘The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks,’’ Pervasive Mobile Comput., vol. 25, pp. 1–25, 2016. [22] A. W. Naji, T. S. Gunawan, S. A. Hameed, B. B. Zaidan, and A. A. Zaidan, ‘‘‘Stego-analysis chain, session one’ investigations on steganography weakness vs stego-analysis system for multimedia file,’’ in Proc. Int. Assoc. Comput. Sci. Inf. Technol. Spring Conf. (IACSIT-SC), Apr. 2009, pp. 405–409. [23] A. A. Zaidan, A. Majeed, and B. B. Zaidan, ‘‘High securing cover-file of hidden data using statistical technique and AES encryption algorithm,’’ World Acad. Sci., Eng. Technol., vol. 54, pp. 463–474, Jun. 2009. [24] W. F. Al-Khateeb and S. A. Hameed, ‘‘New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique,’’ Int. J. Comput. Sci. Netw. Secur., vol. 9, no. 7, pp. 218–224, 2009. [25] A. Medani, A. Gani, O. Zakaria, A. A. Zaidan, and B. B. Zaidan, ‘‘Review of mobile short message service security issues and techniques towards the solution,’’ Sci. Res. Essays, vol. 6, no. 6, pp. 1147–1165, 2011. [26] A. W. Naji, A. S. Housain, B. B. Zaidan, A. A. Zaidan, and S. A. Hameed, ‘‘Security improvement of credit card online purchasing system,’’ Sci. Res. Essays, vol. 6, no. 16, pp. 3357–3370, 2011. [27] M. L. M. Kiah, M. S. Nabi, B. B. Zaidan, and A. A. Zaidan, ‘‘An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1,’’ J. Med. Syst., vol. 37, no. 5, p. 9971, Oct. 2013. [28] M. A. Watari, A. A. Zaidan, and B. B. Zaidan, ‘‘Securing m-government transmission based on symmetric and asymmetric algorithms: A review,’’ Asian J. Sci. Res., vol. 8, pp. 80–94, Oct. 2013. [29] A. Malik, G. Sikka, and H. K. Verma, ‘‘A high capacity text steganography scheme based on LZW compression and color coding,’’ Eng. Sci. Technol. Int. J., vol. 20, no. 1, pp. 72–79, 2017 [30] A. A. Zaidan and B. B. Zaidan, ‘‘Novel approach for high secure data hidden in MPEG video using public key infrastructure,’’ Int. J. Comput. Netw. Secur., vol. 1, no. 1, pp. 1553–1985, 2009. [31] B. B. Zaidan, A. A. Zaidan, and F. Othman, ‘‘Enhancement of the amount of hidden data and the quality of image,’’ Fac. Comput. Sci. Inf. Technol., Univ. Malaya, Kuala Lumpur, Malaysia, Tech. Rep., 2008. [32] A. W. Naji, A. A. Zaidan, and B. B. Zaidan, ‘‘Challenges of hidden data in the unused area two within executable files,’’ J. Comput. Sci., vol. 5, no. 11, pp. 890–897, 2009. [33] A. A. Zaidan, A. W. Naji, S. A. Hameed, F. Othman, and B. B. Zaidan, ‘‘Approved undetectable-antivirus steganography for multimedia information in PE-file,’’ in Proc. Int. Conf. IACSIT Spring Conf. (IACSIT-SC), vol. 9, Apr. 2009, pp. 425–429. [34] B. B. Zaidan, A. A. Zaidan, A. Taqa, and F. Othman, ‘‘Stego-image vs stego-analysis system,’’ Int. J. Comput. Elect. Eng., vol. 1, no. 5, pp. 1793–8163, 2009. [35] A. A. Zaidan, B. Zaidan, and H. A. Jalab, ‘‘A new system for hiding data within (unused area two+image page) of portable executable file using statistical technique and advance encryption Standared,’’ Int. J. Comput. Theory Eng., vol. 2, no. 2, p. 218, 2010. [36] A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem, and K. I. Mohammed, ‘‘Based medical systems for patient’s authentication: Towards a new verification secure framework using CIA standard,’’ J. Med. Syst., vol. 43, no. 7, p. 192, Jul. 2019. [37] Y. Y. A. Talib, B. B. Zaidan, A. A. Zaidan, and A. W. Naji, ‘‘Optimizing security and flexibility by designing a high security system for egovernment servers,’’ in Proc. ICOCI, 2009, pp. 1–5. [38] B. Zaidan, A. Zaidan, F. Othman, R. Z. Raji, S. Mohammed, and M. Abdulrazzaq, ‘‘Quality of image vs. quantity of data hidden in the image,’’ in Proc. IPCV, vol. 6, 2009, pp. 343–350. [39] B. B. Zaidan, A. A. Zaidan, A. Y. Taqa, and F. Othman, ‘‘An empirical study for impact of the increment the size of hidden data on the image texture,’’ in Proc. ICFCC, 2009. [40] H. Alanazi, A. A. Zaidan, B. B. Zaidan, H. A. Jalab, and Z. K. Al-Ani, ‘‘New classification methods for hiding information into two parts: Multimedia files and non multimedia files,’’ J. Comput., vol. 2, no. 3, pp. 144–151, 2010. [41] M. Tang, W. Song, X. Chen, and J. Hu, ‘‘An image information hiding using adaptation and radix,’’ Optik, vol. 126, no. 23, pp. 4136–4141, 2015. [42] A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, S. A. B. Ariffin, O. S. Albahri, A. S. Albahri, M. A. Alsalem, K. I. Mohammed, and M. Hashim, ‘‘Real-time medical systems based on human biometric steganography: A systematic review,’’ J. Med. Syst., vol. 42, no. 12, p. 245, 2018. [43] A. W. Naji, A. A. Zaidan, B. B. Zaidan, S. A. Hameed, and O. O. Khalifa, ‘‘Novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography,’’ J. Comput. Sci., vol. 9, no. 5, pp. 294–300, 2009. [44] A. A. Zaidan, F. Othman, B. B. Zaidan, R. Z. Raji, A. K. Hasan, and A. W. Naji, ‘‘Securing cover-file without limitation of hidden data size using computation between cryptography and steganography,’’ in Proc. World Congr. Eng., vol. 1, 2009, pp. 1–7. [45] B. B. Zaidan, A. A. Zaidan, A. K. Al-Frajatand, and H. A. Jalab, ‘‘On the differences between hiding information and cryptography techniques: An overview,’’ J. Appl. Sci., vol. 10, no. 15, pp. 1650–1655, 2010. [46] A. Majeed, L. M. Kiah, H. T. Madhloom, B. B. Zaidan, and A. A. Zaidan, ‘‘Novel approach for high secure and high rate data hidden in the image using image texture analysis,’’ Int. J. Eng. Technol., vol. 1, no. 2, pp. 63–69, 2009. [47] A. A. Zaidan, B. B. Zaidan, M. M. Abdulrazzaq, R. Z. Raji, and S. M. Mohammed, ‘‘Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography,’’ in Proc. Int. Assoc. Comput. Sci. Inf. Technol., vol. 19, 2009, pp. 482–489. [48] M. E. Eltahir, L. M. Kiah, B. B. Zaidan, and A. A. Zaidan, ‘‘High rate video streaming steganography,’’ in Proc. Int. Conf. Inf. Manage. Eng., Apr. 2009, pp. 550–553. [49] S. H. Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan, and G. M. Alam, ‘‘Securing peer-to-peer mobile communications using public key cryptography: New security strategy,’’ Int. J. Phys. Sci., vol. 6, no. 4, pp. 930–938, 2011. [50] F. Othman, L. Maktom, A. Y. Taqa, B. B. Zaidan, and A. A. Zaidan, ‘‘An extensive empirical study for the impact of increasing data hidden on the images texture,’’ in Proc. Int. Conf. Future Comput. Commun., Apr. 2009, pp. 477–481. [51] Z. K. Al-Ani, A. A. Zaidan, B. B. Zaidan, and H. O. Alanazi, ‘‘Overview: Main fundamentals for steganography,’’ 2010, arXiv:1003.4086. [Online]. Available: https://arxiv.org/abs/1003.4086 [52] P. M. S. Raja and E. Baburaj, ‘‘An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR,’’ in Proc. 3rd Int. Conf. Comput. Intell. Inf. Technol. (CIIT), 2013, pp. 17–24. [53] A. W. Naji, S. A. Hameed, M. R. Islam, B. B. Zaidan, T. S. Gunawan, and A. A. Zaidan, ‘‘‘Stego-analysis chain, session two’ novel approach of stego-analysis system for image file,’’ in Proc. Int. Assoc. Comput. Sci. Inf. Technol.-Spring Conf., Apr. 2009, pp. 410–413. [54] M. A. Ahmed, M. L. M. Kiah, B. B. Zaidan, and A. A. Zaidan, ‘‘A novel embedding method to increase capacity and robustness of lowbit encoding audio steganography technique using noise gate software logic algorithm,’’ J. Appl. Sci., vol. 10, no. 1, pp. 59–64, 2010. [55] R. Islam, A. W. Naji, A. A. Zaidan, and B. B. Zaidan, ‘‘New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques,’’ Int. J. Comput. Sci. Inf. Secur., vol. 7, no. 1, pp. 273–279, 2009. [56] A. A. Zaidan, B. Zaidan, and F. Othman, ‘‘New technique of hidden data in PE-file with in unused area one,’’ Int. J. Comput. Elect. Eng., vol. 1, no. 5, pp. 642–650, 2009. [57] H. A. Jalab, A. A. Zaidan, and B. B. Zaidan, ‘‘Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation,’’ J. Comput., vol. 1, no. 1, pp. 108–113, Dec. 2009. [58] M. Abomhara, O. O. Khalifa, A. A. Zaidan, B. B. Zaidan, O. Zakaria, and A. Gani, ‘‘An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography,’’ Int. J. Phys. Sci., vol. 6, no. 16, pp. 4053–4063, 2011. [59] H. A. Jalab, A. A. Zaidan, and B. B. Zaidan, ‘‘New design for information hiding with in steganography using distortion techniques,’’ Int. J. Eng. Technol., vol. 2, no. 1, p. 72, 2010. [60] M. Elnajjar, A. A. Zaidan, B. B. Zaidan, M. E. M. Sharif, and H. Alanazi, ‘‘Optimization digital image watermarking technique for patent protection,’’ J. Comput., vol. 2, no. 3, pp. 142–148, 2010. [61] A.-N. Yahya, A. A. Zaidan, B. B. Zaidan, H. A. Jalab, and H. O. Alanazi, ‘‘A new system for hidden data within header space for EXE-file using object oriented technique,’’ in Proc. 3rd Int. Conf. Comput. Sci. Inf. Technol., vol. 7, 2010, pp. 9–13. [62] A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, ‘‘Digital image steganography: Survey and analysis of current methods,’’ Signal Process., vol. 90, no. 3, pp. 727–752, Mar. 2010. [63] A. K. Al-Frajat, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan, and B. B. Zaidan, ‘‘Hiding data in video file: An overview,’’ J. Appl. Sci., vol. 10, no. 15, pp. 1644–1649, 2010. [64] A. A. Zaidan, B. B. Zaidan, O. Hamdan Alanazi, A. Gani, O. Zakaria, and G. M. Alam, ‘‘Novel approach for high (secure and rate) data hidden within triplex space for executable file,’’ Sci. Res. Essays, vol. 5, no. 15, pp. 1965–1977, 1965. [65] M. Abomhara, O. O. Khalifa, O. Zakaria, A. A. Zaidan, B. B. Zaidan, and H. O. Alanazi, ‘‘Suitability of using symmetric key to secure multimedia data: An overview,’’ J. Appl. Sci., vol. 10, no. 15, pp. 1656–1661, 2010. [66] A. K. Hmood, H. A. Jalab, Z. M. Kasirun, B. B. Zaidan, and A. A. Zaidan, ‘‘On the capacity and security of steganography approaches: An overview,’’ J. Appl. Sci., vol. 10, no. 16, pp. 1825–1833, 2010. [67] A. H. Ali, L. E. George, A. A. Zaidan, and M. R. Mokhtar, ‘‘High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain,’’ Multimedia Tools Appl., vol. 77, no. 23, pp. 31487–31516, Jun. 2018. [68] A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem, and K. I. Mohammed, ‘‘Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication,’’ Comput. Standard Interfaces, vol. 66, Oct. 2019, Art. no. 103343. [69] S. U. Maheswari and D. J. Hemanth, ‘‘Performance enhanced image steganography systems using transforms and optimization techniques,’’ Multimedia Tools Appl., vol. 76, no. 1, pp. 415–436, 2017. [70] A. W. Naji, A. A. Zaidan, B. B. Zaidan, and I. A. S. Muhamadi, ‘‘Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard,’’ Proc. World Acad. Sci. Eng. Technol., vol. 56, no. 5, pp. 498–502, 2010. [71] B. B. Zaidan, A. A. Zaidan, A. Taqa, G. M. Alam, M. L. M. Kiah, and A. H. Jalab, ‘‘StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem,’’ Int. J. Phys. Sci., vol. 5, no. 11, pp. 1796–1806, 2010. [72] A. A. Zaidan, B. B. Zaidan, Y. A. Taqa, M. K. Sami, G. M. Alam, and A. H. Jalab, ‘‘Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem,’’ Int. J. Phys. Sci., vol. 5, no. 11, pp. 1776–1786, 2010. [73] A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem, and K. I. Mohammed, ‘‘Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions,’’ Comput. Standard Interfaces, vol. 64, pp. 41–60, May 2019. [74] M. L. M. Kiah, B. B. Zaidan, A. A. Zaidan, A. M. Ahmed, and S. H. Al-bakri, ‘‘A review of audio based steganography and digital watermarking,’’ Int. J. Phys. Sci., vol. 6, no. 16, pp. 3837–3850, 2011. [75] Y. Salem, M. Abomhara, O. O. Khalifa, A. A. Zaidan, and B. B. Zaidan, ‘‘A review on multimedia communications cryptography,’’ Res. J. Inf. Technol., vol. 3, no. 3, pp. 146–152, 2011. [76] S. A. Hameed, B. B. Zaidan, A. A. Zaidan, A. W. Naji, and O. Faroq, ‘‘Novel simulation framework of three-dimensional skull bio-metric measurement,’’ Int. J. Comput. Sci. Eng., vol. 1, no. 3, pp. 269–274, 2009. [77] S. A. Hameed, B. B. Zaidan, A. A. Zaidan, A. W. Naji, and O. F. Tawfiq, ‘‘An accurate method to obtain bio-metric measurements for three dimensional skull,’’ J. Appl. Sci., vol. 10, no. 2, pp. 145–150, 2010. [78] A. K. Hmood, B. B. Zaidan, A. A. Zaidan, and H. A. Jalab, ‘‘An overview on hiding information technique in images,’’ J. Appl. Sci., vol. 10, no. 18, pp. 2094–2100, Dec. 2010. [79] A. Hamdan, H. A. Jalab, A. A. Zaidan, and B. B. Zaidan, ‘‘New frame work of hidden data with in non multimedia file,’’ Int. J. Comput. Netw. Secur., vol. 2, no. 1, pp. 46–54, 2010. [80] A. H. Shihab, B. B. Zaidan, A. A. Zaidan, A. W. Naji, and F. Omar, ‘‘Accurate method to measure three dimensional skull bio-metric,’’ J. Appl. Sci., vol. 10, no. 2, pp. 145–150, 2010. [81] A. A. Zaidan, B. B. Zaidan, A. K. Al-Frajat, and H. A. Jalab, ‘‘Investigate the capability of applying hidden data in text file: An overview,’’ J. Appl. Sci., vol. 10, no. 17, pp. 1916–1922, 2010. [82] A. K. Sahu and G. Swain, ‘‘Information hiding using group of bits substitution,’’ Int. J. Commun. Antenna Propag., vol. 7, no. 2, pp. 2–8, 2017. [83] B. B. Zaidan, A. A. Zaidan, H. Abdul Karim, and N. N. Ahmad, ‘‘A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data,’’’ Softw., Pract. Exper., vol. 47, no. 10, pp. 1365–1392, Oct. 2017. [84] B. B. Zaidan and A. A. Zaidan, ‘‘Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decisionmaking techniques,’’ J. Circuits, Syst. Comput., vol. 26, no. 7, Jul. 2017, Art. no. 1750116. [85] B. B. Zaidan, A. A. Zaidan, H. A. Karim, and N. N. Ahmad, ‘‘A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques,’’ Int. J. Inf. Technol. Decis. Making, vol. 16, pp. 1–42, 2017. [86] B. B. Zaidan and A. A. Zaidan, ‘‘Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques,’’ Measurement, vol. 117, pp. 277–294, May 2018. [87] A. H. Mohsin, ‘‘Real-time remote health monitoring systems using body sensor information and finger vein biometric verification: A multi-layer systematic review,’’ J. Med. Syst., vol. 42, no. 12, p. 238, 2018. [88] H. R. Kanan and B. Nazeri, ‘‘A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm,’’ Expert Syst. Appl., vol. 41, no. 14, pp. 6123–6130, 2014. [89] M. Najjarzadeh and A. Ayatollahi, ‘‘A comparison between genetic algorithm and PSO for linear phase FIR digital filter design,’’ in Proc. Int. Conf. Signal Process. (ICSP), Oct. 2008, pp. 2134–2137. [90] A. A. Zaidan, B. B. Zaidan, M. Y. Qahtan, O. S. Albahri, A. S. Albahri, M. Alaa, F. M. Jumaah, M. Talal, K. L. Tan, W. L. Shir, and C. K. Lim, ‘‘A survey on communication components for IoT-based technologies in smart homes,’’ Telecommun. Syst., vol. 69, no. 1, pp. 1–25, 2018 [91] A. A. Zaidan, ‘‘A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: Coherent taxonomy, open issues and recommendation pathway solution,’’ Health Technol., vol. 8, no. 4, pp. 223–238, Sep. 2018. [92] O. S. Albahri, A. S. Albahri, K. I. Mohammed, A. A. Zaidan, B. B. Zaidan, M. Hashim, and O. H. Salman, ‘‘Systematic review of real-time remotehealth monitoring system in triage and priority-based sensor technology: Taxonomy, open challenges, motivation and recommendations,’’ J. Med. Syst., vol. 42, no. 5, p. 80, 2018. [93] A. A. Zaidan and B. B. Zaidan, ‘‘A review on intelligent process for smart home applications based on IoT: Coherent taxonomy, motivation, open challenges, and recommendations,’’ Artif. Intell. Rev., vol. 51, pp. 1–25, 2018. [94] M. A. Alsalem, A. A. Zaidan, B. B. Zaidan, M. Hashim, O. S. Albahri, A. S. Albahri, A. Hadi, and K. I. Mohammed, ‘‘Systematic review of an automated multiclass detection and classification system for acute Leukaemia in terms of evaluation and benchmarking, open challenges, issues and methodological aspects,’’ J. Med. Syst., vol. 42, no. 11, p. 204, 2018. [95] M. A. Alsalem, A. A. Zaidan, B. B. Zaidan, M. Hashim, H. T. Madhloom, N. D. Azeez, and S. Alsyisuf, ‘‘A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations,’’ Comput. Methods Programs Biomed., vol. 158, pp. 93–112, May 2018. [96] A. S. Albahri, A. A. Zaidan, O. S. Albahri, B. B. Zaidan, and M. A. Alsalem, ‘‘Real-time fault-tolerant mHealth system: Comprehensive review of healthcare services, opens issues, challenges and methodological aspects,’’ J. Med. Syst., vol. 42, no. 8, p. 137, 2018. [97] O. S. Albahri, A. A. Zaidan, B. B. Zaidan, M. Hashim, A. S. Albahri, and M. A. Alsalem, ‘‘Real-time remote health-monitoring systems in a medical centre: A review of the provision of healthcare services-based body sensor information, open challenges and methodological aspects,’’ J. Med. Syst., vol. 42, no. 9, p. 164, 2018. [98] O. Zughoul, F. Momani, O. H. Almasri, A. A. Zaidan, B. B. Zaidan, M. A. Alsalem, O. S. Albahri, A. S. Albahri, and M. Hashim, ‘‘Comprehensive insights into the criteria of student performance in various educational domains,’’ IEEE Access, vol. 6, pp. 73245–73264, 2018. [99] M. Khatari, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, and M. A. Alsalem, ‘‘Multi-criteria evaluation and benchmarking for active queue management methods: Open issues, challenges and recommended pathway solutions,’’ Int. J. Inf. Technol. Decision Making, vol. 18, no. 4, pp. 1187–1242, Apr. 2019. [100] M. Talal, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, M. A. Alsalem, A. S. Albahri, A. H. Alamoodi, M. L. M. Kiah, F. M. Jumaah, and M. Alaa, ‘‘Comprehensive review and analysis of anti-malware apps for smartphones,’’ Telecommun. Syst., vol. 72, no. 2, pp. 285–337, 2019. [101] N. M. Napi, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, M. A. Alsalem, and A. S. Albahri, ‘‘Medical emergency triage and patient prioritisation in a telemedicine environment: A systematic review,’’ Health Technol., pp. 1–22, 2019. [102] M. L. Shuwandy, B. B. Zaidan, A. A. Zaidan, and A. S. Albahri, ‘‘Sensorbased mhealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review,’’ J. Med. Syst., vol. 43, no. 2, p. 33, Aug. 2019. [103] M. Talal, A. A. Zaidan, B. B. Zaidan, A. S. Albahri, A. H. Alamoodi, O. S. Albahri, M. A. Alsalem, C. K. Lim, K. L. Tan, W. L. Shir, and K. I. Mohammed, ‘‘Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review,’’ J. Med. Syst., vol. 43, no. 3, p. 42, Mar. 2019. [104] E. M. Almahdi, A. A. Zaidan, B. B. Zaidan, M. A. Alsalem, O. S. Albahri, and A. S. Albahri, ‘‘Mobile patient monitoring systems from a benchmarking aspect: Challenges, open issues and recommended solutions,’’ J. Med. Syst., vol. 43, no. 7, p. 207, 2019. [105] K. Mohammed, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, M. A. Alsalem, A. S. Albahri, A. Hadi, and M. Hashim, ‘‘Real-time remote-health monitoring systems: A review on patients prioritisation for multiple-chronic diseases, taxonomy analysis, concerns and solution procedure,’’ J. Med. Syst., vol. 43, no. 7, p. 223, 2019. [106] Y. Prasad, K. K. Biswas, and M. Hanmandlu, ‘‘A recursive PSO scheme for gene selection in microarray data,’’ Appl. Soft Comput., vol. 71, pp. 213–225, Oct. 2018. [107] H. A. AlSattar, A. A. Zaidan, B. B. Zaidan, M. R. A. Bakar, R. T. Mohammed, O. S. Albahri, M. A. Alsalem, and A. S. Albahri, ‘‘MOGSABAT: A metaheuristic hybrid algorithm for solving multiobjective optimisation problems,’’ Neural Comput. Appl., vol. 30, pp. 1–15, Oct. 2018. [108] H. A. Alsattar, A. A. Zaidan, and B. B. Zaidan, ‘‘Novel meta-heuristic bald eagle search optimisation algorithm,’’ Artif. Intell. Rev., Jul. 2019. [109] F. O. Sameer, M. R. Abu Bakar, A. A. Zaidan, and B. B. Zaidan, ‘‘A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment,’’ Neural Comput. Appl., vol. 31, no. 2, pp. 337–346, Jul. 2017. [110] A. A. Zaidan, B. Atiya, M. R. A. Bakar, and B. B. Zaidan, ‘‘A new hybrid algorithm of simulated annealing and simplex downhill for solving multiple-objective aggregate production planning on fuzzy environment,’’ Neural Comput. Appl., vol. 31, no. 6, pp. 1823–1834, Jul. 2017. [111] A. M. Nickfarjam, H. Ebrahimpour-Komleh, and A. P. Najafabadi, ‘‘Image hiding using neighborhood similarity,’’ in Proc. 6th Conf. Inf. Knowl. Technol. (IKT), May 2014, pp. 79–82. [112] P. Bedi, R. Bansal, and P. Sehgal, ‘‘Using PSO in a spatial domain based image hiding scheme with distortion tolerance,’’ Comput. Elect. Eng., vol. 39, no. 2, pp. 640–654, 2013. [113] Y. E. A. Al-Salhi, L. Songfeng, A. A. G. Al-Hamodi, A. H. Al-Mter, and Z. Zhangv, ‘‘New Qubits steganography algorithm to conceal a secret file in compressed edge detection operators based on optimized adaptive neural networks,’’ in Proc. Int. Conf. Adv. Commun. Technol. (ICACT), 2017, pp. 167–176. [114] N. N. El-Emam, ‘‘New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization,’’ Comput. Secur., vol. 55, pp. 21–45, Nov. 2015. [115] P. Rajeswari, P. Shwetha, and S. Purushothaman, ‘‘Application of wavelet and particle swarm optimization in steganography,’’ in Proc. 2nd Int. Conf. Anti-Cyber Crimes (ICACC), Mar. 2017, pp. 129–132. [116] S. I. Nipanikar, V. H. Deepthi, and N. Kulkarni, ‘‘A sparse representation based image steganography using particle swarm optimization and wavelet transform,’’ Alexandria Eng. J., vol. 57, no. 4, pp. 2343–2356, 2017. [117] S. Sajasi and A. M. E. Moghadam, ‘‘An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method,’’ Appl. Soft Comput., vol. 30, pp. 375–389, May 2015. [118] Z. Li and Y. He, ‘‘Steganography with pixel-value differencing and modulus function based on PSO,’’ J. Inf. Secur. Appl., vol. 43, pp. 47–52, Dec. 2018. [119] D. J. Hemanth, S. Umamaheswari, D. E. Popescu, and A. Naaji, ‘‘Application of genetic algorithm and particle swarm optimization techniques for improved image steganography systems,’’ Open Phys., vol. 14, no. 1, pp. 452–462, 2016. [120] C.-K. Chan and L. M. Cheng, ‘‘Hiding data in images by simple LSB substitution,’’ Pattern Recognit., vol. 37, no. 3, pp. 469–474, Mar. 2004. [121] A. Thamallah, A. Sakly, and F. M’Sahli, ‘‘A new constrained PSO for fuzzy predictive control of quadruple-tank process,’’ Measurement, vol. 136, pp. 93–104, Mar. 2019. [122] J. Matos, R. P. V. Faria, I. B. R. Nogueira, J. M. Loureiro, and A. M. Ribeiro, ‘‘Optimization strategies for chiral separation by true moving bed chromatography using particles swarm optimization (PSO) and new parallel PSO variant,’’ Comput. Chem. Eng., vol. 123, pp. 344–356, Apr. 2019. [123] L. Hongbo and A. Abraham, ‘‘Fuzzy adaptive turbulent particle swarm optimization,’’ in Proc. 5th Int. Conf. Hybrid Intell. Syst. (HIS), Nov. 2005, pp. 445–450. [124] Y. Sun and F. Liu, ‘‘Selecting cover for image steganography by correlation coefficient,’’ in Proc. 2nd Int. Work. Educ. Technol. Comput. Sci. (ETCS), vol. 2, Mar. 2010, pp. 159–162. [125] A. K. Sahu and G. Swain, ‘‘An improved data hiding technique using bit differencing and LSB matching,’’ Internetworking Indonesia J., vol. 10, no. 1, pp. 17–21, 2018. [126] A. K. Sahu and G. Swain, ‘‘An optimal information hiding approach based on pixel value differencing and modulus function,’’ Wireless Pers. Commun., vol. 108, no. 1, pp. 159–174, 2019. [127] A. K. Sahu and G. Swain, ‘‘A novel n-rightmost bit replacement image steganography technique,’’ 3D Res., vol. 10, no. 1, pp. 1–2, 2019. [128] A. K. Sahu, G. Swain, and E. S. Babu, ‘‘Digital image steganography using bit flipping,’’ Cybern. Inf. Technol., vol. 18, no. 1, pp. 69–80, 2018. [129] A. K. Sahu and G. Swain, ‘‘Pixel overlapping image steganography using PVD and modulus function,’’ 3D Res., vol. 9, no. 3, p. 40, 2018. [130] S. Saini, B. A. Rambli, D. Rohaya, M. N. B. Zakaria, and S. B. Sulaiman, ‘‘A review on particle swarm optimization algorithm and its variants to human motion tracking,’’ Math. Problems Eng., vol. 2014, pp. 13–15, Nov. 2014. [131] M. S. Sohail, M. O. B. Saeed, S. Z. Rizvi, M. Shoaib, and A. U. H. Sheikh, ‘‘Low-complexity particle swarm optimization for timecritical applications,’’ pp. 1–24, 2014, arXiv:1401.0546. [Online]. Available: https://arxiv.org/abs/1401.0546 [132] C. W. Wook, J. An, and J.-C. Yoo, ‘‘Estimation of particle swarm distribution algorithms: Combining the benefits of PSO and EDAs,’’ Inf. Sci., vol. 192, pp. 109–119, Jun. 2012. [133] S. Wang, F. Zheng, and L. Xu, ‘‘Comparison between particle swarm optimization and genetic algorithm in artificial neural network for life prediction of NC tools,’’ J. Adv. Manuf. Syst., vol. 7, no. 1, pp. 1–7, 2008.
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |