Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
149 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure Information Embedding in Images with Hybrid Firefly Algorithm (2312.13519v1)

Published 21 Dec 2023 in cs.CR and cs.LG

Abstract: Various methods have been proposed to secure access to sensitive information over time, such as the many cryptographic methods in use to facilitate secure communications on the internet. But other methods like steganography have been overlooked which may be more suitable in cases where the act of transmission of sensitive information itself should remain a secret. Multiple techniques that are commonly discussed for such scenarios suffer from low capacity and high distortion in the output signal. This research introduces a novel steganographic approach for concealing a confidential portable document format (PDF) document within a host image by employing the Hybrid Firefly algorithm (HFA) proposed to select the pixel arrangement. This algorithm combines two widely used optimization algorithms to improve their performance. The suggested methodology utilizes the HFA algorithm to conduct a search for optimal pixel placements in the spatial domain. The purpose of this search is to accomplish two main goals: increasing the host image's capacity and reducing distortion. Moreover, the proposed approach intends to reduce the time required for the embedding procedure. The findings indicate a decrease in image distortion and an accelerated rate of convergence in the search process. The resultant embeddings exhibit robustness against steganalytic assaults, hence rendering the identification of the embedded data a formidable undertaking.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (46)
  1. Yang, X.-S.: Firefly algorithms for multimodal optimization. In: International Symposium on Stochastic Algorithms, pp. 169–178 (2009). Springer Storn and Price [1997] Storn, R., Price, K.: Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. Journal of global optimization 11, 341–359 (1997) Adelson [1990] Adelson, E.H.: Digital signal encoding and decoding apparatus. Google Patents. US Patent 4,939,515 (1990) Yadav and Verma [2016] Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Storn, R., Price, K.: Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. Journal of global optimization 11, 341–359 (1997) Adelson [1990] Adelson, E.H.: Digital signal encoding and decoding apparatus. Google Patents. US Patent 4,939,515 (1990) Yadav and Verma [2016] Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Adelson, E.H.: Digital signal encoding and decoding apparatus. Google Patents. US Patent 4,939,515 (1990) Yadav and Verma [2016] Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  2. Storn, R., Price, K.: Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. Journal of global optimization 11, 341–359 (1997) Adelson [1990] Adelson, E.H.: Digital signal encoding and decoding apparatus. Google Patents. US Patent 4,939,515 (1990) Yadav and Verma [2016] Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Adelson, E.H.: Digital signal encoding and decoding apparatus. Google Patents. US Patent 4,939,515 (1990) Yadav and Verma [2016] Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  3. Adelson, E.H.: Digital signal encoding and decoding apparatus. Google Patents. US Patent 4,939,515 (1990) Yadav and Verma [2016] Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  4. Yadav, V., Verma, N.: Secure multimedia data using digital watermarking: A review. International Journal of Engineering Research and General Science 4(1), 181–187 (2016) Van Schyndel et al. [1994] Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  5. Van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol. 2, pp. 86–90 (1994). IEEE Chaudhary et al. [2012] Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  6. Chaudhary, A., Vasavada, J., Raheja, J., Kumar, S., Sharma, M.: A hash based approach for secure keyless steganography in lossless rgb images. arXiv preprint arXiv:1211.5614 (2012) Melman and Evsutin [2023] Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  7. Melman, A., Evsutin, O.: Comparative study of metaheuristic optimization algorithms for image steganography based on discrete fourier transform domain. Applied Soft Computing 132, 109847 (2023) Wang et al. [2001] Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  8. Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition 34(3), 671–683 (2001) Li and Wang [2007] Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  9. Li, X., Wang, J.: A steganographic method based upon jpeg and particle swarm optimization algorithm. Information Sciences 177(15), 3099–3109 (2007) Bedi et al. [2011] Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  10. Bedi, P., Bansal, R., Sehgal, P.: Using pso in image hiding scheme based on lsb substitution. In: Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part III 1, pp. 259–268 (2011). Springer Nokhwal et al. [2023] Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  11. Nokhwal, S., Pahune, S., Chaudhary, A.: Embau: A novel technique to embed audio data using shuffled frog leaping algorithm. In: Proceedings of the 2023 7th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 79–86 (2023) Alkhliwi [2023] Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  12. Alkhliwi, S.: Huffman encoding with white tailed eagle algorithm-based image steganography technique. Engineering, Technology & Applied Science Research 13(2), 10453–10459 (2023) Rathika and Gayathri [2023] Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  13. Rathika, S., Gayathri, R.: An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images. Multimedia Tools and Applications, 1–18 (2023) Kiran and Vidhya [2023] Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  14. Kiran, G.V., Vidhya, K.: Novel multi-media steganography model using meta-heuristic and deep learning assisted adaptive lifting wavelet transform. Journal of Statistical Computation and Simulation, 1–30 (2023) Melman et al. [2023] Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  15. Melman, A.S., Evsutin, O., et al.: Efficient and error-free information hiding in the hybrid domain of digital images using metaheuristic optimization. Computer research and modeling 15(1), 197–210 (2023) Fofanah and Kalokoh [2023] Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  16. Fofanah, A.J., Kalokoh, I.: Watermarking of frequency and steganography for protection of medical images based on bacterial foraging optimization and genetic algorithm. British J Healthcare Med Res (2023) Yang et al. [2023] Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  17. Yang, A., Bai, Y., Xue, T., Li, Y., Li, J.: A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Generation Computer Systems 145, 293–302 (2023) Salim et al. [2023] Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  18. Salim, A., Mohammed, K.A., Jasem, F.M., Sagheer, A.M.: Image steganography technique based on lorenz chaotic system and bloom filter. International Journal of Computing and Digital Systems 14(1), 1 (2023) Sargunam et al. [2023] Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  19. Sargunam, B., et al.: An empirical study for image steganography and steganalysis: A challenging overview (2023) Hameed et al. [2023] Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  20. Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing 14(5), 4639–4657 (2023) Mahalakshmi et al. [2023] Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  21. Mahalakshmi, G., Sarathambekai, S., Vairam, T.: Improving security using swarm intelligence based optimal pixel selection in image steganography-a study. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), pp. 568–573 (2023). IEEE Bahaddad et al. [2023] Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  22. Bahaddad, A.A., Almarhabi, K.A., Abdel-Khalek, S.: Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal 75, 41–54 (2023) Sharma et al. [2023] Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  23. Sharma, N., Chakraborty, C., Kumar, R.: Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29(5), 2961–2977 (2023) Apau et al. [2023] Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  24. Apau, R., Hayfron-Acquah, J.B., Asante, M., Twum, F.: A multilayered secure image steganography technique for resisting regular-singular steganalysis attacks using elliptic curve cryptography and genetic algorithm. In: International Conference on ICT for Sustainable Development, pp. 427–439 (2023). Springer Wazirali et al. [2019] Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  25. Wazirali, R., Alasmary, W., Mahmoud, M.M., Alhindi, A.: An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7, 133496–133508 (2019) Nokhwal and Kumar [2023a] Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  26. Nokhwal, S., Kumar, N.: Pbes: Pca based exemplar sampling algorithm for continual learning. In: 2023 2nd International Conference on Informatics (ICI) (2023). IEEE Nokhwal and Kumar [2023b] Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  27. Nokhwal, S., Kumar, N.: Dss: A diverse sample selection method to preserve knowledge in class-incremental learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Nokhwal and Kumar [2023c] Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  28. Nokhwal, S., Kumar, N.: Rtra: Rapid training of regularization-based approaches in continual learning. In: 2023 10th International Conference on Soft Computing & Machine Intelligence (ISCMI) (2023). IEEE Tanwer et al. [2020] Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  29. Tanwer, A., Reel, P.S., Reel, S., Nokhwal, S., Nokhwal, S., Hussain, M., Bist, A.S.: System and method for camera based cloth fitting and recommendation. Google Patents. US Patent App. 16/448,094 (2020) Chen et al. [2021] Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  30. Chen, Y., Zhou, L., Zhou, Y., Chen, Y., Hu, S., Dong, Z.: Multiple histograms shifting-based video data hiding using compression sensing. IEEE Access 10, 699–707 (2021) Doğan [2016] Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  31. Doğan, Ş.: A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review 46, 129–143 (2016) Tong et al. [2023] Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  32. Tong, H., Li, T., Xu, Y., Su, X., Qiao, G.: Chaotic coyote optimization algorithm for image encryption and steganography. Multimedia Tools and Applications, 1–27 (2023) Li and He [2018] Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  33. Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on pso. Journal of information security and applications 43, 47–52 (2018) Rustad et al. [2022] Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  34. Rustad, S., De Rosal, I.M.S., Andono, P.N., Syukur, A., et al.: Optimization of cross diagonal pixel value differencing and modulus function steganography using edge area block patterns. Cybernetics and Information Technologies 22(2), 145–159 (2022) Mohsin et al. [2019] Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  35. Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994–169010 (2019) Bala Krishnan et al. [2022] Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  36. Bala Krishnan, R., Rajesh Kumar, N., Raajan, N., Manikandan, G., Srinivasan, A., Narasimhan, D.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications, 1–17 (2022) Nipanikar et al. [2018] Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  37. Nipanikar, S., Deepthi, V.H., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal 57(4), 2343–2356 (2018) Snasel et al. [2020] Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  38. Snasel, V., Kromer, P., Safarik, J., Platos, J.: Jpeg steganography with particle swarm optimization accelerated by avx. Concurrency and Computation: Practice and Experience 32(8), 5448 (2020) Soto et al. [2018] Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  39. Soto, R., Crawford, B., Olivares, R., Taramasco, C., Figueroa, I., Gómez, Á., Castro, C., Paredes, F., et al.: Adaptive black hole algorithm for solving the set covering problem. Mathematical Problems in Engineering 2018 (2018) Cheung et al. [2016] Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  40. Cheung, N.J., Ding, X.-M., Shen, H.-B.: A nonhomogeneous cuckoo search algorithm based on quantum mechanism for real parameter optimization. IEEE transactions on cybernetics 47(2), 391–402 (2016) Gerami et al. [2012] Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  41. Gerami, P., Ebrahim, S., Bashardoost, M.: Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. International Journal of Computer Applications 55(2) (2012) Mohamed et al. [2011] Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  42. Mohamed, M., Al-Afari, F., Bamatraf, M.A.: Data hiding by lsb substitution using genetic optimal key-permutation. Int. Arab. J. e Technol. 2(1), 11–17 (2011) Mohamed et al. [2018] Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  43. Mohamed, M.H., Mofaddel, M.A., Abd El-Naser, T.Y.: Hiding information using secret sharing scheme based on gene expression programming (2018) Douiri and Elbernoussi [2017] Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  44. Douiri, S.M., Elbernoussi, S.: A steganographic method using tabu search approach. In: 2017 Sixteenth Mexican International Conference on Artificial Intelligence (MICAI), pp. 30–33 (2017). IEEE Habibi Lashkari et al. [2011] Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  45. Habibi Lashkari, A., Abdul Manaf, A., Masrom, M., Mohd Daud, S.: A survey on image steganography algorithms and evaluation. In: International Conference on Digital Information Processing and Communications, pp. 406–418 (2011). Springer Schneier [1993] Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
  46. Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191–204 (1993). Springer
Citations (2)

Summary

We haven't generated a summary for this paper yet.