Abstract
The digital content exchange on the Internet is associated with information security risks. Hiding data in digital images is a promising direction in data protection and is an alternative to cryptographic methods. Steganography algorithms create covert communication channels and protect the confidentiality of messages embedded in cover images. Watermarking algorithms embed invisible marks in images for further image authentication and proof of the authorship. The main difficulty in the development of data hiding schemes is to achieve a balance between indicators of embedding quality, including imperceptibility, capacity, and robustness. An effective approach to solving this problem is the use of metaheuristic optimization algorithms, such as genetic algorithm, particle swarm optimization, artificial bee colony, and others. In this paper, we present an overview of data hiding techniques based on metaheuristic optimization. We review and analyze image steganography and image watermarking schemes over the past 6 years. We propose three levels of research classification: embedding purpose level, optimization purpose level, and level of metaheuristics. The results demonstrate the high relevance of using metaheuristic optimization in the development of new data hiding algorithms. Based on the results of the review, we formulate the main problems of this scientific field and suggest promising areas for further research.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Abdelhakim AM, Saad MH, Sayed M, Saleh HI (2018) Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimed Tools Appl 77:27895–27917. https://doi.org/10.1007/s11042-018-6014-5
Abedinia O, Amjady N, Ghasemi A (2016) A new metaheuristic algorithm based on shark smell optimization. Complexity 21:97–116. https://doi.org/10.1002/cplx.21634
Abdul Khalid NE, Md Ariff N, Yahya S, Mohamed Noor N (2011) A review of bio-inspired algorithms as image processing techniques. Commun Comput Inf Sci 179:660–673. https://doi.org/10.1007/978-3-642-22170-5_57
Abdulrahman AK, Ozturk S (2019) A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed Tools Appl 78:17027–17049. https://doi.org/10.1007/s11042-018-7085-z
Ahmadi SBB, Zhang G, Rabbani M et al (2021a) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51:1701–1732. https://doi.org/10.1007/s10489-020-01903-0
Ahmadi SBB, Zhang G, Wei S, Boukela L (2021b) An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis Comput 37:385–409. https://doi.org/10.1007/s00371-020-01808-6
Akay B, Karaboga D (2015) A survey on the applications of artificial bee colony in signal, image, and video processing. SIViP 9:967–990. https://doi.org/10.1007/s11760-015-0758-4
Akyol S, Alatas B (2017) Plant intelligence based metaheuristic optimization algorithms. Artif Intell Rev 47:417–462. https://doi.org/10.1007/s10462-016-9486-6
Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manage 9:602–611. https://doi.org/10.1007/s13198-014-0288-4
Ali M, Ahn CW, Pant M et al (2020) An optimized digital watermarking scheme based on invariant DC coefficients in spatial domain. Electronics 9:1428. https://doi.org/10.3390/electronics9091428
Almawgani AHM, Alhawari ARH, Hindi AT et al (2022) Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidimension Syst Signal Process 33:561–578. https://doi.org/10.1007/s11045-021-00793-w
Alonso FR, Oliveira DQ, Zambroni De Souza AC (2015) Artificial immune systems optimization approach for multiobjective distribution system reconfiguration. IEEE Trans Power Syst 30:840–847. https://doi.org/10.1109/TPWRS.2014.2330628
AlSabhany AA, Ali AH, Ridzuan F et al (2020) Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput Sci Rev 38:100316. https://doi.org/10.1016/j.cosrev.2020.100316
Alsalhi Y (2019) An accurate and high-efficient QuBits steganography scheme based on hybrid neural networks. Multimed Tools Appl 78:17077–17093. https://doi.org/10.1007/s11042-018-7061-7
Altay ŞY, Ulutaş G (2021) Self-adaptive step firefly algorithm based robust watermarking method in DWT-SVD domain. Multimed Tools Appl 80:23457–23484. https://doi.org/10.1007/s11042-020-10251-7
Ambika, Biradar RL (2020) Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique. Health Technol 10:231–247. https://doi.org/10.1007/s12553-018-00289-x
Ambika, Biradar RL, Burkpalli V (2019) Encryption-based steganography of images by multiobjective whale optimal pixel selection. Int J Comput Appl. https://doi.org/10.1080/1206212X.2019.1692442
Ambika, Virupakshappa, Lim S-J (2022) Hybrid image embedding technique using Steganographic Signcryption and IWT-GWO methods. Microprocess Microsyst. https://doi.org/10.1016/j.micpro.2022.104688
Amsaveni A, Bharathi M (2021) Use of firefly optimization algorithm for fractional fourier transform based reversible data hiding. J Intell Fuzzy Syst 40:415–425. https://doi.org/10.3233/JIFS-191911
Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80. https://doi.org/10.1016/j.comcom.2020.01.038
Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans Comput Soc Syst. https://doi.org/10.1109/TCSS.2022.3140862
Andriotis P, Oikonomou G, Tryfonas T (2013) JPEG steganography detection with Benford’s Law. Digit Investig 9:246–257. https://doi.org/10.1016/j.diin.2013.01.005
Anis K, Zied K, Anis S (2021) A reframed watermark extraction approach using the ABC algorithm. Chin J Electron 30:736–742. https://doi.org/10.1049/cje.2021.05.016
Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236. https://doi.org/10.1016/j.patrec.2016.12.010
Ansari IA, Pant M (2018) Quality assured and optimized image watermarking using artificial bee colony. Int J Syst Assur Eng Manage 9:274–286. https://doi.org/10.1007/s13198-016-0568-2
Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76:18001–18025. https://doi.org/10.1007/s11042-016-3680-z
Ariatmanto D, Ernawan F (2020) An improved robust image watermarking by using different embedding strengths. Multimed Tools Appl 79:12041–12067. https://doi.org/10.1007/s11042-019-08338-x
Arsalan M, Qureshi AS, Khan A, Rajarajan M (2017) Protection of medical images and patient related information in healthcare: using an intelligent and reversible watermarking technique. Appl Soft Comput 51:168–179. https://doi.org/10.1016/j.asoc.2016.11.044
Awasthi D, Srivastava VK (2022) LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed Tools Appl 81:25075–25099. https://doi.org/10.1007/s11042-022-12456-4
Azad AS, Rahaman MSA, Watada J et al (2020) Optimization of the hydropower energy generation using meta-heuristic approaches: a review. Energy Rep 6:2230–2248. https://doi.org/10.1016/j.egyr.2020.08.009
Bai Y, Jiang G, Zhu Z et al (2021) Reversible data hiding scheme for high dynamic range images based on multiple prediction error expansion. Signal Process: Image Commun 91:116084. https://doi.org/10.1016/j.image.2020.116084
Bakhsh FY, Moghaddam ME (2018) A robust HDR images watermarking method using artificial bee colony algorithm. J Inf Secur Appl 41:12–27. https://doi.org/10.1016/j.jisa.2018.05.003
Balasamy K, Ramakrishnan S (2019) An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22:4431–4442. https://doi.org/10.1007/s10586-018-1991-8
Banharnsakun A (2018) Artificial bee colony approach for enhancing LSB based image steganography. Multimed Tools Appl 77:27491–27504. https://doi.org/10.1007/s11042-018-5933-5
Bansal M, Mishra A, Sharma A (2022) Multiple scaling Fuzzy-PSO watermarking scheme for gray-scale and colored images. Multimed Tools Appl 81:15219–15248. https://doi.org/10.1007/s11042-022-12526-7
Barlaskar SA, Singh SV, Anish MK, Laskar RH (2022) Genetic algorithm based optimized watermarking technique using hybrid DCNN-SVR and statistical approach for watermark extraction. Multimed Tools Appl 81:7461–7500. https://doi.org/10.1007/s11042-021-11798-9
Basu S, Debnath A, Basu A, Das TS (2022) An image data hiding technique using differential evolution. Multimed Tools Appl 81:39995–40012. https://doi.org/10.1007/s11042-022-12557-0
Ben Ali YM (2019) Smell Bees Optimization for new embedding steganographic scheme in spatial domain. Swarm Evol Comput 44:584–596. https://doi.org/10.1016/j.swevo.2018.08.003
Biswas R, Bandyapadhay SK (2020) Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79:7101–7120. https://doi.org/10.1007/s11042-019-08497-x
Cedillo-Hernandez M, Cedillo-Hernandez A, Garcia-Ugalde FJ (2021) Improving DFT-based image watermarking using particle swarm optimization algorithm. Mathematics 9:1795. https://doi.org/10.3390/math9151795
Chacko A, Chacko S (2022) Deep learning-based robust medical image watermarking exploiting DCT and Harris hawks optimization. Int J Intell Syst 37:4810–4844. https://doi.org/10.1002/int.22742
Chakravarthy S, Jagannathan MA, Ranjani JJ et al (2019) An optimized hierarchical encryption technique for tamper recognition. Multimed Tools Appl 78:18693–18712. https://doi.org/10.1007/s11042-019-7265-5
Chang Q, Li X, Zhao Y, Ni R (2021) Adaptive pairwise prediction-error expansion and multiple histograms modification for reversible data hiding. IEEE Trans Circuits Syst Video Technol 31:4850–4863. https://doi.org/10.1109/TCSVT.2021.3055612
Chauhan DS, Singh AK, Kumar B, Saini JP (2019) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 78:3911–3923. https://doi.org/10.1007/s11042-017-4886-4
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Cheema AM, Adnan SM, Mehmood Z (2020) A novel optimized semi-blind scheme for color image watermarking. IEEE Access 8:169525–169547. https://doi.org/10.1109/ACCESS.2020.3024181
Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423–1443. https://doi.org/10.1109/18.923725
Chen T, Zhu Y, Teng J (2018) Beetle swarm optimisation for solving investment portfolio problems. J Eng 2018:1600–1605. https://doi.org/10.1049/joe.2018.8287
Chen T-S, Hou K-N, Beh W-K, Wu A-Y (2019) Low-complexity compressed-sensing-based watermark cryptosystem and circuits implementation for wireless sensor networks. IEEE Trans Very Large Scale Integr (VLSI) Syst 27:2485–2497. https://doi.org/10.1109/TVLSI.2019.2933722
Cheng R, Jin Y (2015) A competitive swarm optimizer for large scale optimization. IEEE Trans Cybern 45:191–204. https://doi.org/10.1109/TCYB.2014.2322602
Cui X, Niu Y, Zheng X, Han Y (2018) An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image. PLoS ONE 13:e0196306. https://doi.org/10.1371/journal.pone.0196306
Dai C, Chen W, Zhu Y, Zhang X (2009) Seeker optimization algorithm for optimal reactive power dispatch. IEEE Trans Power Syst 24:1218–1231. https://doi.org/10.1109/TPWRS.2009.2021226
Dalal M, Juneja M (2021) A survey on information hiding using video steganography. Artif Intell Rev 54:5831–5895. https://doi.org/10.1007/s10462-021-09968-0
Dappuri B, Rao MP, Sikha MB (2020) Non-blind RGB watermarking approach using SVD in translation invariant wavelet space with enhanced Grey-wolf optimizer. Multimed Tools Appl 79:31103–31124. https://doi.org/10.1007/s11042-020-09433-0
Das S, Biswas A, Dasgupta S, Abraham A (2009) Bacterial foraging optimization algorithm: theoretical foundations, analysis, and applications. Stud Comput Intell 203:23–55. https://doi.org/10.1007/978-3-642-01085-9_2
Deb K (2000) An efficient constraint handling method for genetic algorithms. Comput Methods Appl Mech Eng 186:311–338. https://doi.org/10.1016/S0045-7825(99)00389-8
Devi KJ, Singh P, Dash JK et al (2022a) A new robust and secure 3-level digital image watermarking method based on G-BAT hybrid optimization. Mathematics. https://doi.org/10.3390/math10163015
Devi KJ, Singh P, Thakkar HK, Kumar N (2022b) Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media. Appl Soft Comput. https://doi.org/10.1016/j.asoc.2022.109781
Dhawan S, Chakraborty C, Frnda J et al (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access 9:87563–87578. https://doi.org/10.1109/ACCESS.2021.3089357
Dhawan S, Gupta R, Bhuyan HK et al (2022) An efficient steganography technique based on S2OA & DESAE model. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-13798-9
Ding X, Xie Y, Li P et al (2020) Image steganography based on artificial immune in mobile edge computing with internet of things. IEEE Access 8:136186–136197. https://doi.org/10.1109/ACCESS.2020.3010513
Dittmann J, Megías D, Lang A, Herrera-Joancomartí J (2006) Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4300 LNCS, 1–40. https://doi.org/10.1007/11926214_1
Dorigo M, Birattari M, Stützle T (2006) Ant colony optimization artificial ants as a computational intelligence technique. IEEE Comput Intell Mag 1:28–39. https://doi.org/10.1109/CI-M.2006.248054
Du Y, Yin Z (2022) New framework for code-mapping-based reversible data hiding in JPEG images. Inf Sci 609:319–338. https://doi.org/10.1016/j.ins.2022.07.071
Dubey N, Modi H (2021) A robust discrete wavelet transform based adaptive watermarking scheme in ycbcr color space against camcorder recording in cinema/movie theatres. Eng Sci 15:116–128. https://doi.org/10.30919/es8d491
Elhoseny M, Ramírez-González G, Abu-Elnasr OM et al (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615
El-Kenawy E-SM, Khodadadi N, Khoshnaw A et al (2022) Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking. Appl Sci (switzerland). https://doi.org/10.3390/app122010642
Eshmawi AA, Alsuhibany SA, Abdel-Khalek S, Mansour RF (2022) Competitive swarm optimization with encryption based steganography for digital i.security. Comput Mater Contin 72:4173–4184. https://doi.org/10.32604/cmc.2022.028008
Evsutin O, Melman A, Meshcheryakov R (2020) Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8:166589–166611. https://doi.org/10.1109/ACCESS.2020.3022779
Fan X, Sayers W, Zhang S et al (2020) Review and classification of bio-inspired algorithms and their applications. J Bionic Eng 17:611–631. https://doi.org/10.1007/s42235-020-0049-9
Fathi-Kazerooni S, Rojas-Cessa R (2020) GAN tunnel: network traffic steganography by using GANs to counter internet traffic classifiers. IEEE Access 8:125345–125359. https://doi.org/10.1109/ACCESS.2020.3007577
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8:22–28. https://doi.org/10.1109/93.959097
Gandomi AH, Yang X-S, Alavi AH (2013) Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Eng Comput 29:17–35. https://doi.org/10.1007/s00366-011-0241-y
Ganguly NM, Paul G, Saha SK, Burman D (2020) A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl 79:13449–13479. https://doi.org/10.1007/s11042-019-08178-9
Gao H, Chen Q (2021) A robust and secure image watermarking scheme using SURF and improved Artificial Bee Colony algorithm in DWT domain. Optik 242:166954. https://doi.org/10.1016/j.ijleo.2021.166954
Garg P, Kishore RR (2022a) An efficient and secured blind image watermarking using ABC optimization in DWT and DCT domain. Multimed Tools Appl 81:36947–36964. https://doi.org/10.1007/s11042-021-11237-9
Garg P, Kishore RR (2022b) A robust and secured adaptive image watermarking using social group optimization. Visual Comput. https://doi.org/10.1007/s00371-022-02631-x
Gomes GF, da Cunha SS Jr, Ancelotti AC Jr (2019) A sunflower optimization (SFO) algorithm applied to damage identification on laminated composite plates. Eng Comput 35:619–626. https://doi.org/10.1007/s00366-018-0620-8
Gurunathan K, Rajagopalan SP (2020) A stegano—visual cryptography technique for multimedia security. Multimed Tools Appl 79:3893–3911. https://doi.org/10.1007/s11042-019-7471-1
Halim AH, Ismail I, Das S (2021) Performance assessment of the metaheuristic optimization algorithms: an exhaustive review. Artif Intell Rev 54:2323–2409. https://doi.org/10.1007/s10462-020-09906-6
Hameed MA, Abdel-Aleem OA, Hassaballah M (2022) A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-022-04366-y
Hanizan HS, Din R, Hafiza AS et al (2017) A review of artificial intelligence techniques in image steganography domain. J Eng Sci Technol 12:103–113
Hasan N, Islam MS, Chen W et al (2021) Encryption based image watermarking algorithm in 2DWT-DCT domains. Sensors 21:5540. https://doi.org/10.3390/s21165540
Hashim FA, Hussain K, Houssein EH et al (2021) Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl Intell 51:1531–1551. https://doi.org/10.1007/s10489-020-01893-z
Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Ind Inf 17:7743–7751. https://doi.org/10.1109/TII.2021.3053595
Heidari AA, Mirjalili S, Faris H et al (2019) Harris hawks optimization: algorithm and applications. Future Gener Comput Syst 97:849–872. https://doi.org/10.1016/j.future.2019.02.028
Hemamalini B, Nagarajan V (2020) Wavelet transform and pixel strength-based robust watermarking using dragonflyoptimization. Multimed Tools Appl 79:8727–8746. https://doi.org/10.1007/s11042-018-6096-0
Hossain S, Mukhopadhyay S, Ray B et al (2022) A secured image steganography method based on ballot transform and genetic algorithm. Multimed Tools Appl 81:38429–38458. https://doi.org/10.1007/s11042-022-13158-7
Hsu L-Y, Hu H-T (2020) Blind watermarking for color images using EMMQ based on QDFT. Expert Syst Appl 149:113225. https://doi.org/10.1016/j.eswa.2020.113225
Hsu L-Y, Hu H-T (2021) QDCT-based blind color image watermarking with aid of GWO and DnCNN for performance improvement. IEEE Access 9:155138–155152. https://doi.org/10.1109/ACCESS.2021.3127917
Hsu L-Y, Hu H-T, Chou H-H (2022) A high-capacity QRD-based blind color image watermarking algorithm incorporated with AI technologies. Expert Syst Appl. https://doi.org/10.1016/j.eswa.2022.117134
Huang H-C, Pan J-S, Huang Y-H et al (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26:671–687. https://doi.org/10.1007/s00034-006-0104-z
Huang H-C, Chang F-C, Chen Y-H, Chu S-C (2015) Survey of bio-inspired computing for information hiding. J Inf Hiding Multimed Signal Process 6:430–443
Hussain K, Mohd Salleh MN, Cheng S, Shi Y (2019) Metaheuristic research: a comprehensive survey. Artif Intell Rev 52:2191–2233. https://doi.org/10.1007/s10462-017-9605-z
Jaradat A, Taqieddin E, Mowafi M (2021) A high-capacity image steganography method using chaotic particle swarm optimization. Secur Commun Netw 2021:e6679284. https://doi.org/10.1155/2021/6679284
Jaya Prakash S, Mahalakshmi K (2022) Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer. Visual Comput 38:4129–4150. https://doi.org/10.1007/s00371-021-02285-1
Jeevitha S, Amutha Prabha N (2020) Effective payload and improved security using HMT Contourlet transform in medical image steganography. Health Technol 10:217–229. https://doi.org/10.1007/s12553-018-00285-1
Johnvictor AC, Amalanathan AJ, Pariti Venkata RM, Jethi N (2022) Critical review of bio-inspired data optimization techniques: an image steganalysis perspective. Wiley Interdisc Rev: Data Min Knowl Discov. https://doi.org/10.1002/widm.1460
Jude Hemanth D, Anitha J, Popescu DE, Son LH (2018) A modified genetic algorithm for performance improvement of transform based image steganography systems. J Intell Fuzzy Syst 35:197–209. https://doi.org/10.3233/JIFS-169580
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326. https://doi.org/10.1016/j.neucom.2018.06.075
Kang X, Chen Y, Zhao F, Lin G (2020) Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Comput 24:10561–10584. https://doi.org/10.1007/s00500-019-04563-6
Kapadia AM, Nithyanandam P (2022) A review: reversible information hiding and bio-inspired optimization. Lect Notes Electr Eng 806:489–506. https://doi.org/10.1007/978-981-16-6448-9_48
Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Glob Optim 39:459–471. https://doi.org/10.1007/s10898-007-9149-x
Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139:109691. https://doi.org/10.1016/j.mehy.2020.109691
Kasana G, Kasana SS (2017) Reference based semi blind image watermarking scheme in wavelet domain. Optik 142:191–204. https://doi.org/10.1016/j.ijleo.2017.05.027
Kasana G, Singh K, Bhatia SS (2017) Data hiding using lifting scheme and genetic algorithm. Int J Inf Comput Secur 9:271–287. https://doi.org/10.1504/IJICS.2017.087561
Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76:20499–20524. https://doi.org/10.1007/s11042-016-3962-5
Kazemivash B, Moghaddam ME (2018) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Soft Comput 22:4083–4098. https://doi.org/10.1007/s00500-017-2617-4
Khan S (2018) Ant Colony Optimization (ACO) based data hiding in image complex region. Int J Electr Comput Eng (IJECE) 8:379–389. https://doi.org/10.11591/ijece.v8i1.pp379-389
Khan S, Irfan MA, Khan K et al (2020) ACO based variable least significant bits data hiding in edges using IDIBS algorithm. Symmetry 12:781. https://doi.org/10.3390/sym12050781
Khari M, Garg AK, Gandomi AH et al (2020) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybern: Syst 50:73–80. https://doi.org/10.1109/TSMC.2019.2903785
Koley S (2022) Bat optimized 3D anaglyph image watermarking based on maximum noise fraction in the digital Shearlet domain. Multimed Tools Appl 81:19491–19523. https://doi.org/10.1007/s11042-021-11861-5
Koza JR (1994) Genetic programming as a means for programming computers by natural selection. Stat Comput 4:87–112. https://doi.org/10.1007/BF00175355
Kulkarni AJ, Baki MF, Chaouch BA (2016) Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems. Eur J Oper Res 250:427–447. https://doi.org/10.1016/j.ejor.2015.10.008
Kumar S, Singh BK, Yadav M (2020) A Recent survey on multimedia and database watermarking. Multimed Tools Appl 79:20149–20197. https://doi.org/10.1007/s11042-020-08881-y
Kumar S, Singh MK, Saini D (2021) An image watermarking framework based on PSO and FrQWT. J Discr Math Sci Cryptogr 24:1293–1308. https://doi.org/10.1080/09720529.2021.1936901
Kumar S, Gupta A, Walia GS (2022) Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges. Appl Intell 52:7373–7406. https://doi.org/10.1007/s10489-021-02789-2
Kumari R, Mustafi A (2022) The spatial frequency domain designated watermarking framework uses linear blind source separation for intelligent visual signal processing. Front Neurorobot. https://doi.org/10.3389/fnbot.2022.1054481
Laxmanika, Singh PK (2022) Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD and PSO in wavelet domain. Multimed Tools Appl 81:22001–22026. https://doi.org/10.1007/s11042-021-11246-8
Lei B, Zhao X, Lei H et al (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78:27085–27107. https://doi.org/10.1007/s11042-017-4743-5
Li Z, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J Inf Secur Appl 43:47–52. https://doi.org/10.1016/j.jisa.2018.10.006
Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196. https://doi.org/10.1016/j.sigpro.2016.07.002
Li X-W, Liu Y, Kim S-T, Wang Q-H (2017) Designing a genetic watermarking approach for 3D scenes. Opt Lasers Eng 93:83–91. https://doi.org/10.1016/j.optlaseng.2017.01.013
Li J, Lin Q, Yu C et al (2018) A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22:47–65. https://doi.org/10.1007/s00500-016-2320-x
Li S, Chen H, Wang M et al (2020) Slime mould algorithm: a new method for stochastic optimization. Future Gener Comput Syst 111:300–323. https://doi.org/10.1016/j.future.2020.03.055
Li Y-M, Wei D, Zhang L (2021) Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain. Inf Sci 551:205–227. https://doi.org/10.1016/j.ins.2020.11.020
Liao X, Peng J, Cao Y (2021) GIFMarking: the robust watermarking for animated GIF based deep learning. J vis Commun Image Represent 79:103244. https://doi.org/10.1016/j.jvcir.2021.103244
Lin J-L, Tsai Y-H, Yu C-Y, Li M-S (2012) Interaction enhanced imperialist competitive algorithms. Algorithms 5:433–448. https://doi.org/10.3390/a5040433
Liu X-L, Lin C-C, Yuan S-M (2018) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans Circuits Syst Video Technol 28:1047–1055. https://doi.org/10.1109/TCSVT.2016.2633878
Liu J, Huang J, Luo Y et al (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849–80860. https://doi.org/10.1109/ACCESS.2019.2915596
Lu J, Zhang W, Deng Z et al (2021) Research on information steganography based on network data stream. Neural Comput Appl 33:851–866. https://doi.org/10.1007/s00521-020-05260-4
Lydia EL, Raj JS, Pandi Selvam R et al (2021) Application of discrete transforms with selective coefficients for blind image watermarking. Trans Emerg Telecommun Technol 32:e3771. https://doi.org/10.1002/ett.3771
Mahto DK, Singh AK (2022) Firefly optimization-based dual watermarking for colour images with improved capacity. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-13795-y
Mahto DK, Anand A, Singh AK (2022) Hybrid optimisation-based robust watermarking using denoising convolutional neural network. Soft Comput 26:8105–8116. https://doi.org/10.1007/s00500-022-07155-z
Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf Sci 417:381–400. https://doi.org/10.1016/j.ins.2017.07.026
Malik A, Sikka G, Verma HK (2017) A high capacity text steganography scheme based on LZW compression and color coding. Eng Sci Technol Int J 20:72–79. https://doi.org/10.1016/j.jestch.2016.06.005
Mandal PC, Mukherjee I, Paul G, Chatterji BN (2022) Digital image steganography: a literature survey. Inf Sci 609:1451–1488. https://doi.org/10.1016/j.ins.2022.07.120
Mantiuk R, Kim KJ, Rempel AG, Heidrich W (2011) HDR-VDP-2: a calibrated visual metric for visibility and quality predictions in all luminance conditions. ACM Trans Graph 30(4):1–14. https://doi.org/10.1145/2010324.1964935
Mehbodniya A, Douraki BK, Webber JL et al (2022) Multilayer reversible data hiding based on the difference expansion method using multilevel thresholding of host images based on the slime mould algorithm. Processes. https://doi.org/10.3390/pr10050858
Mehrabian AR, Lucas C (2006) A novel numerical optimization algorithm inspired from weed colonization. Ecol Inform 1:355–366. https://doi.org/10.1016/j.ecoinf.2006.07.003
Mellimi S, Rajput V, Ansari IA, Ahn CW (2021) A fast and efficient image watermarking scheme based on Deep Neural Network. Pattern Recogn Lett 151:222–228. https://doi.org/10.1016/j.patrec.2021.08.015
Mirjalili S (2015) The ant lion optimizer. Adv Eng Softw 83:80–98. https://doi.org/10.1016/j.advengsoft.2015.01.010
Mirjalili S (2016a) Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput Appl 27:1053–1073. https://doi.org/10.1007/s00521-015-1920-1
Mirjalili S (2016b) SCA: a sine cosine algorithm for solving optimization problems. Knowl-Based Syst 96:120–133. https://doi.org/10.1016/j.knosys.2015.12.022
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61. https://doi.org/10.1016/j.advengsoft.2013.12.007
Mirjalili S, Gandomi AH, Mirjalili SZ et al (2017) Salp Swarm Algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191. https://doi.org/10.1016/j.advengsoft.2017.07.002
Moeinaddini E (2019) Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput 23:9685–9699. https://doi.org/10.1007/s00500-018-3535-9
Moeinaddini E, Afsari F (2018) Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm. Multimed Tools Appl 77:26083–26105. https://doi.org/10.1007/s11042-018-5838-3
Mohan A, Anand A, Singh AK et al (2021) Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput Electr Eng 95:107385. https://doi.org/10.1016/j.compeleceng.2021.107385
Mohsin AH, Zaidan AA, Zaidan BB et al (2019) New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7:168994–169010. https://doi.org/10.1109/ACCESS.2019.2949622
Mohsin AH, Zaidan AA, Zaidan BB et al (2021) PSO–blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimed Tools Appl 80:14137–14161. https://doi.org/10.1007/s11042-020-10284-y
Molaei AM, Ebrahimzadeh A (2019) Optimal steganography with blind detection based on Bayesian optimization algorithm. Pattern Anal Appl 22:205–219. https://doi.org/10.1007/s10044-018-00773-0
Moosazadeh M, Ekbatanifard G (2019) A new DCT-based robust image watermarking method using teaching-learning-based optimization. J Inf Secur Appl 47:28–38. https://doi.org/10.1016/j.jisa.2019.04.001
Muhammad K, Ahmad J, Rehman NU et al (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76:8597–8626. https://doi.org/10.1007/s11042-016-3383-5
Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257. https://doi.org/10.1016/j.asoc.2020.106257
Nazari M, Mehrabian M (2021) A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimed Tools Appl 80:10615–10655. https://doi.org/10.1007/s11042-020-10032-2
Nazir H, Bajwa IS, Samiullah M et al (2021) Robust secure color image watermarking using 4D hyperchaotic system, DWT, HbD, and SVD based on improved FOA algorithm. Secur Commun Netw 2021:e6617944. https://doi.org/10.1155/2021/6617944
Nipanikar SI, Hima Deepthi V, Kulkarni N (2018) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alex Eng J 57:2343–2356. https://doi.org/10.1016/j.aej.2017.09.005
Pan W-T (2012) A new Fruit Fly Optimization Algorithm: taking the financial distress model as an example. Knowl-Based Syst 26:69–74. https://doi.org/10.1016/j.knosys.2011.07.001
Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener Comput Syst 111:213–225. https://doi.org/10.1016/j.future.2020.04.034
Pandey MK, Parmar G, Gupta R, Sikander A (2020) Lossless robust color image watermarking using lifting scheme and GWO. Int J Syst Assur Eng Manage 11:320–331. https://doi.org/10.1007/s13198-019-00859-w
Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230. https://doi.org/10.1016/j.jbi.2017.01.006
Parah SA, Sheikh JA, Akhoon JA et al (2018) Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimed Tools Appl 77:185–207. https://doi.org/10.1007/s11042-016-4253-x
Pelikan M, Sastry K, Goldberg DE (2002) Scalability of the Bayesian optimization algorithm. Int J Approx Reason 31:221–258. https://doi.org/10.1016/S0888-613X(02)00095-6
Pereira S, Voloshynovskiy S, Madueno M et al (2001) Second generation benchmarking and application oriented evaluation. In: Moskowitz IS (ed) Information hiding. Springer, Berlin, pp 340–353
Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17:58–64. https://doi.org/10.1109/79.879339
Petitcolas FAP, Fatès N (2004) StirMark Benchmark manual. https://www.petitcolas.net/watermarking/stirmark/. Accessed 30 May 2023
Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: Aucsmith D (ed) Information hiding. Springer, Berlin, pp 218–238
Pizzolante R, Castiglione A, Carpentieri B et al (2018) On the protection of consumer genomic data in the Internet of Living Things. Comput Secur 74:384–400. https://doi.org/10.1016/j.cose.2017.06.003
Pourhadi A, Mahdavi-Nasab H (2020) A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimed Tools Appl 79:21653–21677. https://doi.org/10.1007/s11042-020-08960-0
Prabha KR, Jagadeeswari M (2020) Enhanced imperialist competitive algorithm based efficient reversible data hiding technique. Multimed Tools Appl 79:4057–4074. https://doi.org/10.1007/s11042-019-07772-1
Pradhan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng 2018:e1804953. https://doi.org/10.1155/2018/1804953
Pramanik S, Singh RP, Ghosh R (2020) Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. Multimed Tools Appl 79:17463–17482. https://doi.org/10.1007/s11042-020-08676-1
Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13:1670–1681. https://doi.org/10.1109/TIFS.2018.2799381
Rai M, Goyal S (2022) A hybrid digital image watermarking technique based on fuzzy-BPNN and shark smell optimization. Multimed Tools Appl 81:39471–39489. https://doi.org/10.1007/s11042-022-12712-7
Rao RV, Savsani VJ, Vakharia DP (2011) Teaching-learning-based optimization: a novel method for constrained mechanical design optimization problems. CAD Comput Aided Des 43:303–315. https://doi.org/10.1016/j.cad.2010.12.015
Ray B, Mukhopadhyay S, Hossain S et al (2021) Image steganography using deep learning based edge detection. Multimed Tools Appl 80:33475–33503. https://doi.org/10.1007/s11042-021-11177-4
Reshma VK, Vinod Kumar RS, Shahi D, Shyjith MB (2022) Optimized support vector neural network and contourlet transform for image steganography. Evol Intell 15:1295–1311. https://doi.org/10.1007/s12065-020-00387-8
Roselin Kiruba R, Sree Sharmila T (2021) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multimed Syst Signal Process 32:405–430. https://doi.org/10.1007/s11045-019-00697-w
Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron C 72:149–161. https://doi.org/10.1016/j.aeue.2016.12.003
Saadati M, Vahidi J, Seydi V, Sheikholharam Mashhadi P (2021) Proposing a new image watermarking method using shearlet transform and whale optimization algorithm. Int J Eng Trans A 34:843–853. https://doi.org/10.5829/ije.2021.34.04a.10
Sabeti V, Aghabagheri A (2022) Developing an adaptive DCT-based steganography method using a genetic algorithm. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-14166-3
Sabeti V, Sobhani M, Hasheminejad SMH (2022) An adaptive image steganography method based on integer wavelet transform using genetic algorithm. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2022.107809
Salehnia T, Fathi A (2021) Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique. Expert Syst Appl 179:115058. https://doi.org/10.1016/j.eswa.2021.115058
Salimi H (2015) Stochastic fractal search: a powerful metaheuristic algorithm. Knowl-Based Syst 75:1–18. https://doi.org/10.1016/j.knosys.2014.07.025
Salimi L, Haghighi A, Fathi A (2020) A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimed Tools Appl 79:11357–11374. https://doi.org/10.1007/s11042-019-08455-7
Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30–47. https://doi.org/10.1016/j.advengsoft.2017.01.004
Sarmah DK, Kulkarni AJ (2018) JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms. Inf Sci 430–431:378–396. https://doi.org/10.1016/j.ins.2017.11.027
Sarmah DK, Kulkarni AJ (2019) Improved cohort intelligence—a high capacity, swift and secure approach on JPEG image steganography. J Inf Secur Appl 45:90–106. https://doi.org/10.1016/j.jisa.2019.01.002
Satapathy S, Naik A (2016) Social group optimization (SGO): a new population evolutionary optimization technique. Complex Intell Syst 2:173–203. https://doi.org/10.1007/s40747-016-0022-8
Saxena N, Mishra KK (2017) Improved multi-objective particle swarm optimization algorithm for optimizing watermark strength in color image watermarking. Appl Intell 47:362–381. https://doi.org/10.1007/s10489-016-0889-5
Setiadi DRIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423–8444. https://doi.org/10.1007/s11042-020-10035-z
Sharma N, Batra U (2021) An enhanced Huffman-PSO based image optimization algorithm for image steganography. Genet Program Evolvable Mach 22:189–205. https://doi.org/10.1007/s10710-020-09396-z
Sharma S, Sharma H, Sharma JB (2019) An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl Soft Comput 84:105696. https://doi.org/10.1016/j.asoc.2019.105696
Sharma C, Bagga A, Singh BK, Shabaz M (2021a) A novel optimized graph-based transform watermarking technique to address security issues in real-time application. Math Probl Eng 2021:e5580098. https://doi.org/10.1155/2021/5580098
Sharma S, Chauhan U, Khanam R, Singh KK (2021b) Digital watermarking using dragonfly optimization algorithm. J Inf Technol Manage 12:36–47. https://doi.org/10.22059/JITM.2020.78888
Sharma S, Chauhan U, Khanam R, Singh KK (2021c) Digital watermarking using grasshopper optimization algorithm. Open Comput Sci 11:330–336. https://doi.org/10.1515/comp-2019-0023
Sharma S, Sharma H, Sharma JB (2021d) Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain. Multimed Tools Appl 80:18753–18785. https://doi.org/10.1007/s11042-021-10610-y
Sharma S, Sharma H, Sharma JB, Poonia RC (2021e) A secure and robust color image watermarking using nature-inspired intelligence. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05634-8
Sharma N, Chakraborty C, Kumar R (2022a) Optimized multimedia data through computationally intelligent algorithms. Multimed Syst. https://doi.org/10.1007/s00530-022-00918-6
Sharma NK, Kumar S, Rajpal A, Kumar N (2022b) MantaRayWmark: an image adaptive multiple embedding strength optimization based watermarking using Manta Ray Foraging and bi-directional ELM. Expert Syst Appl. https://doi.org/10.1016/j.eswa.2022.116860
Sharma S, Sharma H, Sharma JB (2022c) A new optimization based color image watermarking using non-negative matrix factorization in discrete cosine transform domain. J Ambient Intell Humaniz Comput 13:4297–4319. https://doi.org/10.1007/s12652-021-03408-1
Shen Y, Tang C, Xu M et al (2021) A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO. Expert Syst Appl 168:114414. https://doi.org/10.1016/j.eswa.2020.114414
Shih FY, Wu Y-T (2005) Robust watermarking and compression for medical images based on genetic algorithms. Inf Sci 175:200–216. https://doi.org/10.1016/j.ins.2005.01.013
Shih FY, Zhong X, Chang I-C, Satoh S (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed Tools Appl 77:1623–1642. https://doi.org/10.1007/s11042-017-4367-9
Shojae Chaeikar S, Ahmadi A (2019) Ensemble SW image steganalysis: a low dimension method for LSBR detection. Signal Process: Image Commun 70:233–245. https://doi.org/10.1016/j.image.2018.10.004
Shukur WA, Jabbar KK (2018) Information hiding using LSB technique based on developed PSO algorithm. Int J Electr Comput Eng (IJECE) 8:1156–1168. https://doi.org/10.11591/ijece.v8i2.pp1156-1168
Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76:13001–13024. https://doi.org/10.1007/s11042-016-3706-6
Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901–15921. https://doi.org/10.1007/s11042-018-6407-5
Singh OP, Singh AK, Srivastava G, Kumar N (2021a) Image watermarking using soft computing techniques: a comprehensive survey. Multimed Tools Appl 80:30367–30398. https://doi.org/10.1007/s11042-020-09606-x
Singh P, Devi KJ, Thakkar HK, Santamaría J (2021b) Blind and secured adaptive digital image watermarking approach for high imperceptibility and robustness. Entropy 23:1650. https://doi.org/10.3390/e23121650
Singh R, Saraswat M, Ashok A et al (2023) From classical to soft computing based watermarking techniques: a comprehensive review. Future Gener Comput Syst 141:738–754. https://doi.org/10.1016/j.future.2022.12.015
Singhal A, Bedi P (2021) Multi-class blind steganalysis using deep residual networks. Multimed Tools Appl 80:13931–13956. https://doi.org/10.1007/s11042-020-10353-2
Sinhal R, Ansari IA (2022) Tunable Q-factor wavelet transform-based robust image watermarking scheme using logistic mapping and antlion optimization. Circuits Syst Signal Process 41:6370–6410. https://doi.org/10.1007/s00034-022-02090-8
Sisaudia V, Vishwakarma VP (2021) Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimed Tools Appl 80:8667–8688. https://doi.org/10.1007/s11042-020-10028-y
Sivananthamaitrey P, Kumar PR (2022a) Optimal dual watermarking of color images with SWT and SVD through genetic algorithm. Circuits Syst Signal Process 41:224–248. https://doi.org/10.1007/s00034-021-01773-y
Sivananthamaitrey P, Kumar PR (2022b) Performance analysis of meta-heuristics on dual watermarking of color images based on SWT and SVD. Multimed Tools Appl 81:1001–1027. https://doi.org/10.1007/s11042-021-11204-4
Soliman MM, Hassanien AE, Onsi HM (2014) Bio-inspiring techniques in watermarking medical images: a review. Intell Syst Ref Libr 70:93–114. https://doi.org/10.1007/978-3-662-43616-5_4
Soppari K, Chandra NS (2022) Automated digital image watermarking based on multi-objective hybrid meta-heuristic-based clustering approach. Int J Intell Robot Appl. https://doi.org/10.1007/s41315-022-00241-3
Stegherr H, Heider M, Hähner J (2022) Classifying metaheuristics: towards a unified multi-level classification system. Nat Comput 21:155–171. https://doi.org/10.1007/s11047-020-09824-0
Storn R, Price K (1997) Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11:341–359. https://doi.org/10.1023/A:1008202821328
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https://doi.org/10.1016/j.bspc.2019.101665
Swaraja K, Meenakshi K, Kora P (2021) Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine. Biomed Signal Process Control 68:102688. https://doi.org/10.1016/j.bspc.2021.102688
Takieldeen AE, El-Kenawy E-SM, Hadwan M, Zaki RM (2022) Dipper throated optimization algorithm for unconstrained function and feature selection. Comput Mater Contin 72:1465–1481. https://doi.org/10.32604/cmc.2022.026026
Tang L, Xie J, Wu D (2022) An interval type-2 fuzzy edge detection and matrix coding approach for color image adaptive steganography. Multimed Tools Appl 81:39145–39167. https://doi.org/10.1007/s11042-022-13127-0
Thakkar FN, Srivastava VK (2017a) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669–3697. https://doi.org/10.1007/s11042-016-3928-7
Thakkar FN, Srivastava VK (2017b) A particle swarm optimization and block-SVD-based watermarking for digital images. Turk J Electr Eng Comput Sci 25:3273–3288. https://doi.org/10.3906/elk-1603-17
Thakkar FN, Srivastava VK (2019) Performance comparison of recent optimization algorithm Jaya with particle swarm optimization for digital image watermarking in complex wavelet domain. Multidimens Syst Sign Process 30:1769–1791. https://doi.org/10.1007/s11045-018-0627-8
Thakkar FN, Srivastava VK (2021) An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT. Multimed Tools Appl 80:12275–12292. https://doi.org/10.1007/s11042-020-10220-0
Trelea IC (2003) The particle swarm optimization algorithm: convergence analysis and parameter selection. Inf Process Lett 85:317–325. https://doi.org/10.1016/S0020-0190(02)00447-7
Uma Maheswari S, Jude Hemanth D (2017) Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76:415–436. https://doi.org/10.1007/s11042-015-3035-1
Vali MH, Aghagolzadeh A, Baleghi Y (2018) Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition. Expert Syst Appl 114:296–312. https://doi.org/10.1016/j.eswa.2018.07.004
Vazquez E, Torres S, Sanchez G et al (2022) Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence. Front Robot AI. https://doi.org/10.3389/frobt.2022.1031299
Venkata Rao R (2016) Jaya: a simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int J Ind Eng Comput 7:19–34. https://doi.org/10.5267/j.ijiec.2015.8.004
Verma OP, Aggarwal D, Patodi T (2016) Opposition and dimensional based modified firefly algorithm. Expert Syst Appl 44:168–176. https://doi.org/10.1016/j.eswa.2015.08.054
Walia GS, Makhija S, Singh K, Sharma K (2018) Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik 170:106–124. https://doi.org/10.1016/j.ijleo.2018.04.135
Wan W, Wang J, Zhang Y et al (2022) A comprehensive survey on robust image watermarking. Neurocomputing 488:226–247. https://doi.org/10.1016/j.neucom.2022.02.083
Wang W, Li Q (2022) An image steganography algorithm based on PSO and IWT for underwater acoustic communication. IEEE Access 10:107376–107385. https://doi.org/10.1109/ACCESS.2022.3212691
Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683. https://doi.org/10.1016/S0031-3203(00)00015-7
Wang G-G, Deb S, Gao X-Z, Dos Santos CL (2016) A new metaheuristic optimisation algorithm motivated by elephant herding behaviour. Int J Bio-Inspired Comput 8:394–409. https://doi.org/10.1504/IJBIC.2016.081335
Wang J, Ni J, Zhang X, Shi Y-Q (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybern 47:315–326. https://doi.org/10.1109/TCYB.2015.2514110
Wang G-G, Deb S, Zhao X, Cui Z (2018a) A new monarch butterfly optimization with an improved crossover operator. Oper Res Int J 18:731–755. https://doi.org/10.1007/s12351-016-0251-z
Wang Z, Zhang X, Yin Z (2018b) Joint cover-selection and payload-allocation by steganographic distortion optimization. IEEE Signal Process Lett 25:1530–1534. https://doi.org/10.1109/LSP.2018.2865888
Wang J, Chen X, Ni J et al (2020) Multiple histograms-based reversible data hiding: framework and realization. IEEE Trans Circuits Syst Video Technol 30:2313–2328. https://doi.org/10.1109/TCSVT.2019.2915584
Wang D, Li M, Zhang Y (2022) Adversarial data hiding in digital images. Entropy. https://doi.org/10.3390/e24060749
Wazirali R, Alasmary W, Mahmoud MMEA, Alhindi A (2019) An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7:133496–133508. https://doi.org/10.1109/ACCESS.2019.2941440
Weng S, Zhou Y, Zhang T et al (2022) General framework to reversible data hiding for JPEG images with multiple two-dimensional histograms. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2022.3198877
Wu J-Y, Huang W-L, Zuo M-J, Gong L-H (2020) Optical watermark scheme based on singular value decomposition ghost imaging and particle swarm optimization algorithm. J Mod Opt 67:1059–1071. https://doi.org/10.1080/09500340.2020.1810346
Xiang S, He J (2018) Database authentication watermarking scheme in encrypted domain. IET Inf Secur 12:42–51. https://doi.org/10.1049/iet-ifs.2017.0092
Xiang L, Li Y, Hao W et al (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. Comput Mater Contin 55:541–559. https://doi.org/10.3970/cmc.2018.03510
Xiao Y, Gao G (2019) Digital watermark-based independent individual certification scheme in WSNs. IEEE Access 7:145516–145523. https://doi.org/10.1109/ACCESS.2019.2945177
Yang X-S (2010) Firefly algorithm, stochastic test functions and design optimization. Int J Bio-Inspired Comput 2:78–84. https://doi.org/10.1504/IJBIC.2010.032124
Yang X-S, Gandomi AH (2012) Bat algorithm: a novel approach for global engineering optimization. Eng Comput (swansea, Wales) 29:464–483. https://doi.org/10.1108/02644401211235834
Yang C-N, Hsu S-C, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Comput Stand Interfaces 50:209–215. https://doi.org/10.1016/j.csi.2016.10.005
Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51. https://doi.org/10.1016/j.sigpro.2016.10.017
Ying Q, Qian Z, Zhang X, Ye D (2019) Reversible data hiding with image enhancement using histogram shifting. IEEE Access 7:46506–46521. https://doi.org/10.1109/ACCESS.2019.2909560
Yu L, Zhao Y, Ni R, Zhu Z (2009) PM1 steganography in JPEG images using genetic algorithm. Soft Comput 13:393–400. https://doi.org/10.1007/s00500-008-0327-7
Zakaria AA, Hussain M, Wahab AWA et al (2018) High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci 8:2199. https://doi.org/10.3390/app8112199
Zhang Y, Ma X-L (2019) Research on image digital watermarking optimization algorithm under virtual reality technology. Discr Contin Dyn Syst—S 12:1427. https://doi.org/10.3934/dcdss.2019098
Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed Tools Appl 78:28003–28023. https://doi.org/10.1007/s11042-019-07902-9
Zhang X, Sun Z, Tang Z et al (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl 76:9195–9218. https://doi.org/10.1007/s11042-016-3521-0
Zhang Y, Ye D, Gan J et al (2018) An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection. Comput Mater Contin 56:151–167. https://doi.org/10.3970/cmc.2018.02464
Zhang X, Zhang W, Sun W et al (2020) A robust watermarking scheme based on roi and IWT for remote consultation of covid-19. Comput Mater Contin 64:1435–1452. https://doi.org/10.32604/cmc.2020.011359
Zhang T, Yang C, Weng S, Hou T (2022) Adaptive multi-histogram reversible data hiding with contrast enhancement. J vis Commun Image Represent. https://doi.org/10.1016/j.jvcir.2022.103637
Zhao B, Fang L, Zhang H et al (2019) Y-DWMS: a digital watermark management system based on smart contracts. Sensors 19:3091. https://doi.org/10.3390/s19143091
Zhao W, Zhang Z, Wang L (2020) Manta ray foraging optimization: an effective bio-inspired optimizer for engineering applications. Eng Appl Artif Intell 87:103300. https://doi.org/10.1016/j.engappai.2019.103300
Zheng Z, Saxena N, Mishra KK, Sangaiah AK (2018) Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Gener Comput Syst 88:92–106. https://doi.org/10.1016/j.future.2018.05.027
Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507–2523. https://doi.org/10.1007/s11042-018-6322-9
Zhou L, Han H, Wu H (2021) Generalized reversible data hiding with content-adaptive operation and fast histogram shifting optimization. Entropy 23:917. https://doi.org/10.3390/e23070917
Acknowledgements
This research was funded by Russian Science Foundation, project No 21-71-10113. We are very grateful to the anonymous referees for their constructive comments and helpful suggestions to improve the quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Melman, A., Evsutin, O. Image data hiding schemes based on metaheuristic optimization: a review. Artif Intell Rev 56, 15375–15447 (2023). https://doi.org/10.1007/s10462-023-10537-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-023-10537-w