Conclusions and Future Recommendations

Nowadays computer networks play a vital role and demand secured data transfer. Cryptography (Sarmah and Bajpai in Int J Comput Appl 8(9):7–10, 2010 [16]) and Steganography (Sarmah and Bajpai in Int J Comput Appl 8(9):7–10, 2010 [16]) are the two important sciences work in this area. There is always a possibility of attack by cryptanalyst (Ahmad et al. in Emerging ICT for Bridging the Future, Advances in Intelligent Systems and Computing, Proceedings of the 49th Annual Convention of the Computer Society of India CSI, Springer, Berlin, pp. 381–388 (2015) [1]) and/or steganalyst (Bohme in Inf Secur Cryptogr 0:11–77 (2010) [4]) or any unintended receivers on the sensitive information, which creates a need to enhance the growth of algorithms in the domain of information security.

[1]  Anand J. Kulkarni,et al.  Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods , 2018 .

[2]  Nameer N. El-Emam New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization , 2015, Comput. Secur..

[3]  V Ramaswamy,et al.  Performance Enhancement Of Blowfish Algorithm By Modifying Its function , 2007 .

[4]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[5]  Imran Raza Khan,et al.  Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System , 2015 .

[6]  Anand Jayant Kulkarni,et al.  JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms , 2018, Inf. Sci..

[7]  Yazan Aljeroudi,et al.  Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.

[8]  Anand Jayant Kulkarni,et al.  Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography , 2019, J. Inf. Secur. Appl..

[9]  Gilbert L. Peterson Forensic Analysis of Digital Image Tampering , 2005, IFIP Int. Conf. Digital Forensics.

[10]  Hideki Noda,et al.  A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme , 2006, EJC.

[11]  Rafał Renk,et al.  Cyber Threats Impacting Critical Infrastructures , 2016 .

[12]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[13]  Dipti Kapoor Sarmah,et al.  Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography , 2010, ArXiv.

[14]  Rainer Böhme,et al.  Principles of Modern Steganography and Steganalysis , 2010 .

[15]  P. Rempoulakis,et al.  Suppression of cuelure attraction in male Queensland fruit flies provided raspberry ketone supplements as immature adults , 2017, PloS one.

[16]  Yang Musheng,et al.  The Research of Intelligent Monitoring System Based on Digital Image Processing , 2009, 2009 Second International Conference on Intelligent Computation Technology and Automation.

[17]  Tae-Sung Kim,et al.  An analysis on effects of information security investments: a BSC perspective , 2012, J. Intell. Manuf..