Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Pratiksha Sethi, V. Kapoor

Pratiksha Sethi and V Kapoor. A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography. International Journal of Computer Applications 144(9):5-11, June 2016. BibTeX

	author = {Pratiksha Sethi and V. Kapoor},
	title = {A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {144},
	number = {9},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {5-11},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2016910425},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Encryption is used to securely communicate data in open networks. Each type of data has its own structures; therefore according to the data the different techniques should be used to defend confidential data. Among them digital images are also very popular to carry confidential information in untrusted networks. . For pleasing the defense of data hiding and communication over network, the proposed system uses cryptographic algorithm along with Steganography. In the proposed system, the file which user want to make secure is firstly compressed to shrink in size and then the compressed data is altered into cipher text by using AES cryptographic algorithm and then the encrypted data is concealed in the image. In order to hide the information over the image in complex manner the genetic algorithm based technique is implemented which is used to evaluate the valuable pixels where the data can be hide in a secure manner. In addition of that, for hiding the information in images, the LSB (least significant bits) based steganographic method is used after the selection of eligible pixels. The implementation of the anticipated technique is performed using JAVA technology and for performance evaluation the time and space complexity is computed. In addition of that a comparative study of the proposed technique using the image steganographic technique is also performed in terms of PSNR and MSE. According to the computed performance the proposed technique is adoptable for hiding information in image securely additionally that consumes less space complexity.


  1. Xiliang Liu, "Selective encryption of multimedia content in distribution networks: challenges and new directions", Proceedings of Communications, Internet, and Information Technology (CIIT 2003), Scottsdale, AZ, USA, Nov. 2003.
  2. Falesh M. Shelke et al. “Comparison of different techniques for Steganography in images ”International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 2, February 2014.
  3. Pratiksha Sethi and V. Kapoor “A proposed novel architecture for image steganography using Genetic algorithm along with cryptography” ICRTCSE 2016.
  4. M.Kundalakesi, Sharmathi.R and Akshaya.R, “Overview of Modern Cryptography”, International Journal of Computer Science and Information Technologies (IJCSIT), Volume 6, PP. 350-353, 2015.
  5. Manoj Kumar Pandey, Mrs. Deepty Dubey, “Survey Paper: Cryptography The art of hiding Information”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), PP. 3168-3171, Volume 2, December 2013.
  6. Mohammed AbuTaha, Mousa Farajallah and Radwan Tahboub, “Survey Paper: Cryptography Is the Science of Information Security”, International Journal of Computer Science and Security (IJCSS), PP. 298- 309, Volume 5, 2011.
  7. Prakash Kuppuswamy, and Saeed Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, MIS Review: An International Journal, Volume 19, No. 2, PP. 1-13, March 2014.
  8. Priyanka B. Kutade and Parul S. Arora Bhalotra “A Survey on Various Approaches of Image Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 109 – No. 3, January 2015
  9. Silman J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001.
  10. Lee Y. K. and Chen L. H., “High capacity image steganographic model”, IEEE Proceedings of Visual Image Signal Processing, Vol. 147, No. 3, pp. 288-294, 2000.
  11. Ker A., “Improved detection of LSB steganography in grayscale image”, Lecture Notesin Computer Science, pp. 97-115, 2005.
  12. Mahdavi, Samavi Sh., Zaker N. & M Hashemi.,“Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram”, Iranian Journal of Electrical & Electronic Engineering, Vol. 4, No. 3, pp. 59-70, 2008.
  13. Manish Trehan and Sumit Mittu, “Steganography and Cryptography Approaches Combined using Medical Digital Images”, International Journal of Engineering Research & Technology (IJERT), Volume 4 June 2015.
  14. David E. Goldbrg, “Genetic Algorithm in Search, Optimization & Machine Learning”,Pearson Education Asia.
  15. Genetic Algorithms for optimization, Programs for MATLAB Version 1.0 User Manual.
  16. Anil Kumar and Rohini Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique” International Journal of Advanced Research in Computer Science and Software Engineering 3(7), July - 2013, pp. 363-372


Steganography, AES cryptographic algorithm, LSB, genetic algorithm.