Skip to main content
  • Book
  • © 2020

Optimization Models in Steganography Using Metaheuristics

  • Explores in detail an Artificial Intelligence-based socio-inspired optimization algorithm referred to as Cohort Intelligence (CI)
  • Focuses on the steganography approach, along with Cognitive Computing (CC) and a Multi-Random Start Local Search (MRSLS) optimization algorithm
  • Presents a range of optimization models used in steganography

Part of the book series: Intelligent Systems Reference Library (ISRL, volume 187)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (8 chapters)

  1. Front Matter

    Pages i-xiii
  2. Introduction

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 1-32
  3. Cryptography and Digital Image Steganography Techniques

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 33-48
  4. Heuristics and Metaheuristic Optimization Algorithms

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 49-61
  5. Secret Text Embedding Capacity Improvement (Approach 3)

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 91-121
  6. Improved Cohort Intelligence Optimization Algorithm (Approach 4)

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 123-145
  7. Steganalysis on All Approaches/Vulnerability Analysis of Stego Image(s)

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 147-161
  8. Conclusions and Future Recommendations

    • Dipti Kapoor Sarmah, Anand J. Kulkarni, Ajith Abraham
    Pages 163-166

About this book

This book explores the use of a socio-inspired optimization algorithm (the Cohort Intelligence algorithm), along with Cognitive Computing and a Multi-Random Start Local Search optimization algorithm. One of the most important types of media used for steganography is the JPEG image. Considering four important aspects of steganography techniques – picture quality, high data-hiding capacity, secret text security and computational time – the book provides extensive information on four novel image-based steganography approaches that employ JPEG compression. Academics, scientists and engineers engaged in research, development and application of steganography techniques, optimization and data analytics will find the book’s comprehensive coverage an invaluable resource.


Authors and Affiliations

  • Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India

    Dipti Kapoor Sarmah, Anand J. Kulkarni

  • Scientific Network for Innovation and Research Excellence, Machine Intelligence Research Labs (MIR), Auburn, USA

    Ajith Abraham

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access