Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 113 - Number 1
Year of Publication: 2015
Authors:
Yogita Patil
10.5120/19791-1470

Yogita Patil. Article: Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network. International Journal of Computer Applications 113(1):21-23, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Yogita Patil},
	title = {Article: Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {113},
	number = {1},
	pages = {21-23},
	month = {March},
	note = {Full text available}
}

Abstract

Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of data hiding and transmission over network, this paper proposed system which uses genetic algorithm along with Visual Cryptography. Plain text is converted into cipher text by using any cipher then it is hidden in LSB of image. Genetic Algorithm is used to shuffle pixel location of image so that detection of secret information become complex. Pixel locations are shuffled using Scan code algorithm. Visual cryptography is kind of encryption technique which divide secret image into multiple shares to ensure improved security and reliability.

References

  • Mrs. G. Prema, S. Natarajan, "Steganography using genetic Algorithm along with visual Cryptography for Wireless Network Application", International conference on information communication and embedded systems (ICICES), 2013.
  • Fridrich J. , Goljan M. And Du R, "Reliable Detection of LSB Steganography in Color and Grayscale Images", Proceedings of Workshop on Multimedia and Security, Ottawa, pp. 27-30, , October 5 2001.
  • J. Fridrich, M. Goljan and D. Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm", In Proc. Of the ACM Workshop on Multimedia and Security, 2002.
  • Chao-Shen Chen, Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology", Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), 2006.
  • Sozan Abdulla, "New Visual Cryptography Algorithm For Colored Image", Journal of computing, volume 2, issue 4, April 2010.
  • Divya James, Mintu Philip, "A Novel Anti Phishing framework based on Visual Cryptography", IEEE, 2011.
  • Kulvinder Kaur, Vineeta Khemchandani, "Securing Visual Cryptographic Shares using Public Key Encryption ", IEEE, 2012.
  • Souvik Roy and P. Venkateswaran, "Online Payment System using Steganography and Visual Cryptography", Students' Conference on Electrical, Electronics and Computer Science, 2014.