CFP last date
20 May 2024
Reseach Article

Data Hiding Scheme for Digital Images based on Genetic Algorithms with LSBMR

by P. M. Siva Raja, E. Baburaj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 5
Year of Publication: 2012
Authors: P. M. Siva Raja, E. Baburaj
10.5120/9542-3984

P. M. Siva Raja, E. Baburaj . Data Hiding Scheme for Digital Images based on Genetic Algorithms with LSBMR. International Journal of Computer Applications. 59, 5 ( December 2012), 8-15. DOI=10.5120/9542-3984

@article{ 10.5120/9542-3984,
author = { P. M. Siva Raja, E. Baburaj },
title = { Data Hiding Scheme for Digital Images based on Genetic Algorithms with LSBMR },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 5 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 8-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number5/9542-3984/ },
doi = { 10.5120/9542-3984 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:05:19.336204+05:30
%A P. M. Siva Raja
%A E. Baburaj
%T Data Hiding Scheme for Digital Images based on Genetic Algorithms with LSBMR
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 5
%P 8-15
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern information hiding technology is an important branch of information security. Hiding capacity is very much important for efficient covert communication. The redundancies of digital media as well as the characteristic of human visual system make hiding technology a significant one. Steganography is the Art and Science of writing hidden messages in such a way that no one, apart from the sender and intended recipient suspects the existence of the message. Images are the mostly cover objects used for information hiding schemes. Image steganography is the most popular method for message concealment. Many different carrier file formats can be used, but digital images are the common, because of their frequency in the Internet. In LSBMR, two secret bits can be embedded into each embedding unit and the threshold value for region selection can be determined. The main drawback of this scheme is the absolute difference is taken as the threshold value. In this paper LSB Matching Revisited (LSBMR) image steganography using Genetic Algorithm (GA) is proposed, in which Genetic algorithm is used to select the embedding regions according to the size of the secret message and to optimize the threshold value of the selected image regions. Experimental analysis shows that the proposed algorithm outperforms the existing methods in terms of capacity and security.

References
  1. C. H. Yang, C. Y Weng, S. J. Wang et al. , "Adaptive Data Hiding in Edge Areas of Images With Spatial LSB DomainSystems,"IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp488-497,2008.
  2. Weiqi Luo, Fangjun Huang, Jiwu Huang,"Edge Adaptive Image Steganography Based on LSB Matching Revisited" IEEE Transactions on Information Forensics and Security, Vol. 5 No. 2, pp 201-214,June 2010.
  3. Mahdi Ramezani, Shahrokh," Adaptive Image Steganoraphy with Mod-4 Embedding using Image Contrast", IEEE CCNC 2010 Proceedings.
  4. M. Ramezani and S. Ghaemmaghami, "Towards Genetic Feature Selection in Image Steganalysis," in 6th IEEE International Workshop on Digital Rights Management, Las Vegas, USA, 2010, PPT.
  5. Mielkainen, "LSB matching revisited,"IEEE Signal process Lett. , vol. 13no. p. 285 – 287, May 2006
  6. S. Dumitrscu, X. Wu . and Z. Wang, Detection of LSB steganography via Sample pair analysis,"IEEE Trans. Signal process. , Vol. 51. no. 7. pp. 1995 – 2007, Jul. 2003.
  7. Weiqi Luo,Fanggjun Hunang and Jiwu Huang,"Edge Adaptive Image Steganoraphy Based on LSB Matching Revisited"IEEE Transactions on Information Forensics and Security,vol. 5, No 2,June 2010
  8. Ran-Zan Wang,Chi-Fang Lin,Ja-Chen Lin "Image Hiding by optimal LSB substitution and genetic algoritm",Pattern Recognition Society, Published by Elsevier Science Ltd. pp. 671-683,2001.
  9. R. Z. Wang and C. F. Lin: ImageHiding by Optimal LSB Substituition and Genetic Algorithm, Pattern Recognition, ELSEVIER, Vol. 34, (2001)671-883.
  10. T. Zhang and X. Ping: A New Approach to Reliable Detection of LSB Steganography in Natural Image, Signal Processing Journal, ELSEVIER, Vol. 83 May(2003) 2085- 2093.
  11. Information Hiding Techniques for steganography and Digital Watermarking. S. Katzenbeizzer and F. A. Petticolas, eds. Artech House, 2000.
  12. R. J. Anderson, "Stretching the Limits of Steganography," proc. First International workshop Information Hiding (IH '96), pp. 39 – 48, 1996.
  13. X. Li. T. Zeng. and B. ang,"Detecting LSB matching by applying calibration technique for difference image", in proc. 10th ACM Workshop on multimedia and security, Oxford, UK. , 2008. pp. 133-138.
  14. C. Cachin,"An Information-Theoratic Model for Steganography", proc. Second InInt'l Workshop Information Hiding (IH '98), pp. 306 -318, 1998.
  15. J. Zollner,H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modelling the security of steganographic Systems," proc. Second Int'l Workshop Information Hiding (IH '98), pp. 344 – 354, 1998.
  16. C. T. Hsu,J. L. Wu,Hidden digital watermarking in images,IEEE Transactions on Image Processing,vol 8,pp 58-68,1999.
  17. C. K. Chan and L. M. Chen " Hiding data in images by simple LSB substituition,"Pattern Recognit. , vol. 37, no. 3 pp 469-474, 2004.
  18. C. C. Chang and H. W. Tseng ,"A steganographic method for digital images using side match,"Pattern Recognit. Lett. vol 25, no, 12 pp. 1431-1437, 2004.
  19. H. C. Wu aN. I. Wu C. S Tsai and M. S. Hwang,"Image Steganographic scheme based on pixel- value differencing and LSB replacement methods", proc. Inst. Elect. Eng. vis Image Digital Process. vol. 152. no. 5, pp. 611-615, 2005.
  20. Y. R. Park , H. H. Kang , S. U. Shin and K. R. Kwon, A steganographic scheme in digital Images Using Informatio of Neighbouring Pixels. Berlin, Germany: Springer-Verlag, 2005, vol. 3612, pp/ 962-968.
  21. K. Hempstalk ,"Hiding Behind corners: Using edges in images for better steganography", in proc. Computing Women's Congress. Hamilton, New Zealand. 2006. .
  22. Y. Q. Shi et al. " Image Steganalysis based on moments of characteristic functions using Wavelet decompostitions prediction-error image. and neural metwork. " in proc. IEEE Int. Conf. Multimedia and Expo. Jul. 6-8, 2005. pp. 269-272.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Message concealment Information hiding Region selection Genetic algorithms