{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:17:55Z","timestamp":1774369075993,"version":"3.50.1"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,6,7]]},"abstract":"<jats:p>Image steganography has been widely adopted to protect confidential data. Researchers have been seeking to improve the steganographic techniques in order to increase the embedding capacity while preserving the stego-image quality. In this paper, we propose a steganography method using particle swarm optimization and chaos theory aiming at finding the best pixel locations in the cover image to hide the secret data while maintaining the quality of the resultant stego-image. To enhance the embedding capacity, the host and secret images are divided into blocks and each block stores an appropriate amount of secret bits. Experimental results show that the proposed scheme outperforms existing methods in terms of the PSNR and SSIM image quality metrics.<\/jats:p>","DOI":"10.1155\/2021\/6679284","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T18:57:17Z","timestamp":1623178637000},"page":"1-11","source":"Crossref","is-referenced-by-count":28,"title":["A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4085-1315","authenticated-orcid":true,"given":"Aya","family":"Jaradat","sequence":"first","affiliation":[{"name":"Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8520-1965","authenticated-orcid":true,"given":"Eyad","family":"Taqieddin","sequence":"additional","affiliation":[{"name":"Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4885-9722","authenticated-orcid":true,"given":"Moad","family":"Mowafi","sequence":"additional","affiliation":[{"name":"Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.3923\/ijp.2011.382.387"},{"issue":"1","key":"2","first-page":"426","article-title":"Steganography in images using lsb technique","volume":"5","author":"A. K. Singh","year":"2015","journal-title":"International Journal of Latest Trends in Engineering and Technology (IJLTET)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.1916.1922"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.03.012"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2010.1650.1655"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.075"},{"issue":"3","key":"7","first-page":"102","article-title":"A survey of image steganography","volume":"2","author":"S. Kaur","year":"2014","journal-title":"IJRECE (International Journal of Research in Electronics and Computer Engineering)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2474-6"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2017.1293881"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949622"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106257"},{"key":"12","first-page":"1","article-title":"Chaotic particle swarm optimization","author":"H. A. Hefny"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SCCS.2019.8852625"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.10.006"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-018-0188-5"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2909906"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5520-1_12"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2941440"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i6.pp5218-5226"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3372-2"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2017.09.005"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.01.032"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.2568"},{"issue":"1","key":"24","first-page":"28","article-title":"A secure steganography method based on genetic algorithm","volume":"1","author":"S. Wang","year":"2010","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2010.5734138"},{"issue":"4","key":"26","doi-asserted-by":"crossref","first-page":"123","DOI":"10.14257\/ijgdc.2015.8.4.12","article-title":"Particle swarm optimization with chaotic maps and Gaussian mutation for function optimization","volume":"8","author":"T. Dongping","year":"2015","journal-title":"International Journal of Grid and Distributed Computing"},{"issue":"4","key":"27","first-page":"593","article-title":"Chaotic map based random image steganography using lsb technique","volume":"19","author":"S. Rajendran","year":"2017","journal-title":"International Journal of Network Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2914924"},{"issue":"6","key":"29","first-page":"1279","article-title":"A symmetric steganography with secret sharing and psnr analysis for image steganography","volume":"3","author":"A. Singh","year":"2012","journal-title":"International Journal of Scientific and Engineering Research"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2003.819861"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6679284.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6679284.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6679284.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T18:57:29Z","timestamp":1623178649000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6679284\/"}},"subtitle":[],"editor":[{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":30,"alternative-id":["6679284","6679284"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6679284","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6,7]]}}}