[go: up one dir, main page]

Skip to main content

Optimization Models in Steganography Using Metaheuristics

  • Book
  • © 2020

Overview

  • Explores in detail an Artificial Intelligence-based socio-inspired optimization algorithm referred to as Cohort Intelligence (CI)
  • Focuses on the steganography approach, along with Cognitive Computing (CC) and a Multi-Random Start Local Search (MRSLS) optimization algorithm
  • Presents a range of optimization models used in steganography

Part of the book series: Intelligent Systems Reference Library (ISRL, volume 187)

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook USD 15.99 USD 84.99
Discount applied Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book explores the use of a socio-inspired optimization algorithm (the Cohort Intelligence algorithm), along with Cognitive Computing and a Multi-Random Start Local Search optimization algorithm. One of the most important types of media used for steganography is the JPEG image. Considering four important aspects of steganography techniques – picture quality, high data-hiding capacity, secret text security and computational time – the book provides extensive information on four novel image-based steganography approaches that employ JPEG compression. Academics, scientists and engineers engaged in research, development and application of steganography techniques, optimization and data analytics will find the book’s comprehensive coverage an invaluable resource.


Similar content being viewed by others

Keywords

Table of contents (8 chapters)

Authors and Affiliations

  • Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India

    Dipti Kapoor Sarmah, Anand J. Kulkarni

  • Scientific Network for Innovation and Research Excellence, Machine Intelligence Research Labs (MIR), Auburn, USA

    Ajith Abraham

Bibliographic Information

Publish with us