Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm

[1]  T. Sree Sharmila,et al.  Efficient analysis of hybrid directional lifting technique for satellite image denoising , 2014, Signal Image Video Process..

[2]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[3]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[4]  T. S. R. Raja,et al.  Impact of applying pre-processing techniques for improving classification accuracy , 2014, Signal Image Video Process..

[5]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[6]  FridrichJessica,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001 .

[7]  T. Sree Sharmila,et al.  Performance analysis in secured image encryption and data hiding using LSB algorithm , 2017, 2017 IEEE International Conference on Circuits and Systems (ICCS).

[8]  T. Sree Sharmila,et al.  Secure data hiding by fruit fly optimization improved hybridized seeker algorithm , 2020 .

[9]  Fayed F. M. Ghaleb,et al.  Optimized video steganography using Cuckoo Search algorithm , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).

[10]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[11]  T. Sree Sharmila,et al.  Comparative Analysis of satellite Image pre-Processing Techniques , 2013, J. Comput. Sci..

[12]  Jamshid Shanbehzadeh,et al.  High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .

[13]  T. Sree Sharmila,et al.  Hiding Data in Videos Using Optimal Selection of Key-Frames , 2018, 2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP).

[14]  Sree Sharmila Thangaswamy,et al.  Developing an efficient technique for satellite image denoising and resolution enhancement for improving classification accuracy , 2013 .

[15]  Andrew Lewis,et al.  The Whale Optimization Algorithm , 2016, Adv. Eng. Softw..

[16]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[17]  Punam Bedi,et al.  Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..

[18]  Warley Gramacho Da Silva,et al.  Optimizing Image Steganography using Particle Swarm Optimization Algorithm , 2017 .

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  R. Haff,et al.  Detection of Fruit-fly Infestation in Olives using X-Ray Imaging: Algorithm Development and Prospects , 2016 .

[21]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[22]  Yongquan Zhou,et al.  A Novel Cuckoo Search Optimization Algorithm Base on Gauss Distribution , 2012 .

[23]  Robert Cousins,et al.  Clarification of the use of CHI-square and likelihood functions in fits to histograms , 1984 .

[24]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[25]  Warley Gramacho,et al.  Optimizing Image Steganography using Particle Swarm Optimization Algorithm , 2017 .

[26]  Chaohua Dai,et al.  Seeker Optimization Algorithm for Optimal Reactive Power Dispatch , 2009, IEEE Transactions on Power Systems.

[27]  Andrew Lewis,et al.  Grey Wolf Optimizer , 2014, Adv. Eng. Softw..