CFP last date
20 May 2024
Reseach Article

High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm

by Usha B.a, N.k Srinath, Pulkita, Sarthak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 14
Year of Publication: 2015
Authors: Usha B.a, N.k Srinath, Pulkita, Sarthak
10.5120/21610-4770

Usha B.a, N.k Srinath, Pulkita, Sarthak . High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm. International Journal of Computer Applications. 121, 14 ( July 2015), 30-33. DOI=10.5120/21610-4770

@article{ 10.5120/21610-4770,
author = { Usha B.a, N.k Srinath, Pulkita, Sarthak },
title = { High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 14 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number14/21610-4770/ },
doi = { 10.5120/21610-4770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:26.446272+05:30
%A Usha B.a
%A N.k Srinath
%A Pulkita
%A Sarthak
%T High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 14
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art of hiding data in a cover medium such that the existence of the data remains secretive and is not easily identifiable. It is known that cryptographic techniques help augment the image steganography process to a great degree. Genetic algorithms (GA) are used in image steganography due to 'adaptive heuristic search' based on evolutionary biology. This provides us with various challenges such as choice of an encryption algorithm for encrypting the secret message, efficiently generating the search space for the GA by using image data, modelling an efficient fitness function for the GA to evolve into its solutions, and various challenges in handling the embedding of secret data, reading writing image data, producing stego image, and a process to decode the secret information back from the stego image.

References
  1. G. Prema, S. Natarajan - "Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application", International Conference On Information communication and embedded systems. Shivakasi , India. Vol 5 pp 727-730, 2013
  2. Ahmed,A, Agarwal,N, Banerjee S - "Image Steganography By Closest Pixel-pair Mapping", International Conference on Advances in Computing, Communications and Informatics, India. pp 200-221, Sept 2014.
  3. Prasenjit Das, NirmalaKar - "A DNA Based Image Steganography using 2D Chaotic Map", International Conference On Electronics and Communication Systems ,Agartala, India. pp 1-5, 2014.
  4. Yafeng Z, - "A Study of influence between digital watermarking and steganography", International Conference on Wavlet Analysis and Pattern Recogition, IEEE,Vol 7,pp 331-339 2013.
  5. Whitelam, C , Osia,N ,Bourlai,T - "Securing multimodal biometric data through watermarking and steganography. ", International Conference On Technologies For Homeland Security, IEEE, Vol 13, pp 22-28,May 2013.
  6. Jyoti, Sabir,"Genetic Algorithm Based Image Steganography for Enhancement of Concealing Capacity and Security", Internal Journal Image, Graphics and Signal Processing, Vol 7, Issue 18-25, pp 305-309, 2013
  7. Shen Wang, Bian Yang and Xiamu Niu - "A Secure Steganography Method Based On Genetic Algorithm", Journal Of Information Hiding and Multimedia Signal Processing, Harbin, China. Vol 27. pp 171-182, January 2010.
  8. Artz, D. , "Digital Steganography: Hiding Data within Data", IEEE Internet Computing Journal, Vol 13, pp 58-68, June 2001.
  9. Provos, N. & Honeyman, P. , "Hide and Seek: An introduction to steganography", IEEE Security and Privacy Journal, pp 1613-1626, March 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Genetic algorithm Image steganography LSB Pixel Indexed table