{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T01:46:17Z","timestamp":1772588777346,"version":"3.50.1"},"reference-count":23,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Robot. AI"],"abstract":"<jats:p>Nowadays, image steganography has an important role in hiding information in advanced applications, such as medical image communication, confidential communication and secret data storing, protection of data alteration, access control system for digital content distribution and media database systems. In these applications, one of the most important aspects is to hide information in a cover image whithout suffering any alteration. Currently, all existing approaches used to hide a secret message in a cover image produce some level of distortion in this image. Although these levels of distortion present acceptable PSNR values, this causes minimal visual degradation that can be detected by steganalysis techniques. In this work, we propose a steganographic method based on a genetic algorithm to improve the PSNR level reduction. To achieve this aim, the proposed algorithm requires a private key composed of two values. The first value serves as a seed to generate the random values required on the genetic algorithm, and the second value represents the sequence of bit locations of the secret medical image within the cover image. At least the seed must be shared by a secure communication channel. The results demonstrate that the proposed method exhibits higher capacity in terms of PNSR level compared with existing works.<\/jats:p>","DOI":"10.3389\/frobt.2022.1031299","type":"journal-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T05:46:33Z","timestamp":1665035193000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence"],"prefix":"10.3389","volume":"9","author":[{"given":"Eduardo","family":"Vazquez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephanie","family":"Torres","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giovanny","family":"Sanchez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Juan-Gerardo","family":"Avalos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marco","family":"Abarca","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thania","family":"Frias","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Emmanuel","family":"Juarez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos","family":"Trejo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Derlis","family":"Hernandez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1965","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"B1","first-page":"398","article-title":"A hybrid image steganography method based on genetic algorithm","author":"Al-Janabi","year":"2016"},{"key":"B2","doi-asserted-by":"publisher","first-page":"101783","DOI":"10.1016\/j.bspc.2019.101783","article-title":"Continuous and recurrent pattern dynamic neural networks recognition of electrophysiological signals","volume":"57","author":"Alfaro-Ponce","year":"2020","journal-title":"Biomed. Signal Process. Control"},{"key":"B3","doi-asserted-by":"publisher","first-page":"1712","DOI":"10.5281\/zenodo.1337857","article-title":"A robust image steganography method using pmm in bit plane domain","volume":"8","author":"Bhattacharyya","year":"2015","journal-title":"Int. J. Comput. Inf. Eng."},{"key":"B4","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1109\/TLA.2019.8986421","article-title":"A review of steganography techniques for digital information transmission for secure channels with digital images","volume":"17","author":"Caballero Hernandez","year":"2019","journal-title":"IEEE Lat. Am. Trans."},{"key":"B5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit. DAGM."},{"key":"B6","first-page":"1172","article-title":"Ensemble of logistic maps with genetic algorithm for optimal pixel selection in image steganography","author":"Chandrasekaran","year":"2015"},{"key":"B7","volume-title":"Handbook of genetic algorithms","author":"Davis","year":"1991"},{"key":"B8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-44874-8","volume-title":"Introduction to evolutionary computing","author":"Eiben","year":"2015"},{"key":"B9","doi-asserted-by":"publisher","first-page":"116482","DOI":"10.1016\/j.eswa.2021.116482","article-title":"Assistive robotic exoskeleton using recurrent neural networks for decision taking for the robust trajectory tracking","volume":"193","author":"Fuentes-Alvarez","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"B10","first-page":"836","article-title":"An imperceptible steganographic method based on genetic algorithm","author":"Ghasemi","year":"2010"},{"key":"B11","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1109\/tla.2019.8986421","article-title":"A review of steganography techniques for digital information transmission for secure channels with digital images","volume":"17","author":"Hern\u00e1ndez","year":"2019","journal-title":"IEEE Lat. Am. Trans."},{"key":"B12","volume-title":"Concerning efficient adaptive systems","author":"Holland","year":"1962"},{"key":"B13","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"Katzenbeisser","year":"2000"},{"key":"B14","volume-title":"enIntroduction to the design & analysis of algorithms","author":"Levitin","year":"2012"},{"key":"B15","volume-title":"Handbook of applied cryptography","author":"Menezes","year":"1996"},{"key":"B16","first-page":"1","article-title":"A highly secure video steganography using hamming code 7, 4","author":"Mstafa","year":"2014"},{"key":"B17","first-page":"114","article-title":"Enhanced image steganography system based on discrete wavelet transformation and resilient back-propagation","volume":"16","author":"Naoum","year":"2016","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"B18","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1016\/j.dsp.2010.02.003","article-title":"Classification of steganalysis techniques: A study","volume":"20","author":"Nissar","year":"2010","journal-title":"Digit. Signal Process."},{"key":"B19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","article-title":"Hide and seek: an introduction to steganography","volume":"1","author":"Provos","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1186\/1687-4722-2012-20","article-title":"Speech steganography using wavelet and Fourier transforms","volume":"20","author":"Rekik","year":"2012","journal-title":"EURASIP J. Audio Speech Music Process."},{"key":"B21","first-page":"1620","article-title":"Video steganography by LSB substitution using different polynomial equations","volume":"2","author":"Swathi","year":"2012","journal-title":"Int. J. Comput. Eng. Res."},{"key":"B22","first-page":"55","article-title":"Increasing data hiding capacity of BPCS steganography using LZW compression technique","volume":"3","author":"Vaishali","year":"2015","journal-title":"Int. J. Adv. Comput. Eng. Netw."},{"key":"B23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00175354","article-title":"A genetic algorithm tutorial","volume":"4","author":"Whitley","year":"1994","journal-title":"Stat. Comput."}],"container-title":["Frontiers in Robotics and AI"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frobt.2022.1031299\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T05:46:48Z","timestamp":1665035208000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frobt.2022.1031299\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":23,"alternative-id":["10.3389\/frobt.2022.1031299"],"URL":"https:\/\/doi.org\/10.3389\/frobt.2022.1031299","relation":{},"ISSN":["2296-9144"],"issn-type":[{"value":"2296-9144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,6]]},"article-number":"1031299"}}