CFP last date
20 May 2024
Reseach Article

Enhanced Version of StegGen: An Optimized Steganographic Tool based on GA

Published on May 2012 by Murugeswari Kandavel, Deisy C, Ganesan Govindan, Suganthi J
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 4
May 2012
Authors: Murugeswari Kandavel, Deisy C, Ganesan Govindan, Suganthi J
f4d1fe40-21ed-45a6-9e9c-ebc4aa3729e0

Murugeswari Kandavel, Deisy C, Ganesan Govindan, Suganthi J . Enhanced Version of StegGen: An Optimized Steganographic Tool based on GA. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 4 (May 2012), 9-12.

@article{
author = { Murugeswari Kandavel, Deisy C, Ganesan Govindan, Suganthi J },
title = { Enhanced Version of StegGen: An Optimized Steganographic Tool based on GA },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 4 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/ncacsa/number4/6499-1024/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A Murugeswari Kandavel
%A Deisy C
%A Ganesan Govindan
%A Suganthi J
%T Enhanced Version of StegGen: An Optimized Steganographic Tool based on GA
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 4
%P 9-12
%D 2012
%I International Journal of Computer Applications
Abstract

Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. Naturally, there are security agents who would like to fight these data hiding systems by steganalysis, i. e. discovering covered messages and rendering them useless. There is currently no steganography system which can resist all steganalysis attacks. In this paper we propose an optimal GA evolutionary process to make an optimized steganographic encoding on an audio file in addition to Bitmap images. Our steganography step is based on our tool StegGen, which is designed using LSB color cycle scheme for images and now it enhanced for audio steganography using substitution techniques.

References
  1. Sellars D. : An Introduction to Steganography, cs. uct. ac. za/courses/CS400W/NIS /papers99/ dsellars/stego. htm
  2. lMartín Alvaro, Sapiro Guillermo and Seroussi Gadiel : Is Image Steganography Natural?,IEEE Transactions On Image Processing, Vol. 14, No. 12, December, 2005.
  3. Cvejic N. and Seppänen T : Increasing the capacity of LSB based audio steganography, Proc. 5th IEEE International Workshop on Multimedia Signal Processing, St. Thomas, VI, December 2002, pp. 336-338.
  4. Lee, Y. K. and Chen L. H. : High Capacity Image Steganographic Model, IEEE Proceedings Vision, Image and Signal Processing, pp. 288-294, 2000.
  5. N. F. Johnson, S. Jajodia : Exploring Steganography: Seeing the Unseen, IEEE Computer, February 1998, pp. 26-34.
  6. Julie K. Petersen : The Telecommunications Illustrated Dictionary, CRC Press, 2002, ISBN:084931173X
  7. Kefa Rabah, : Steganography – The Art of Hiding Data, Information Technology Journal 3 (3), 2004, pp. 245-269.
  8. Pal S. K. , Saxena P. K. and Mutto S. K. : The Future of Audio Steganography, Pacific Rim Workshop on Digital Steganography, Japan, 2002.
  9. Westfeld A. and Pitzmann A. : Attacks on Steganographic Systems , Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, pp. 61-75, 2000.
  10. Fridrich, Jessica et. al. , : Steganalysis of LSB Encoding in Color Images, Proceedings of the IEEE International Conference on Multimedia. 1279–1282. New York: IEEE Press, 2000.
  11. G. Ganesan, K. Murugeswari et. al. : StegGen: A Steganographic Tool using LSB Color Cycle, proceedings of NCINM 2011.
  12. Mazdak Zamani and Azizah A. Manaf et. Al . : A Genetic-Algorithm-Based Approach for Audio Steganography , World Academy of Science, Engineering and Technology,2009
Index Terms

Computer Science
Information Sciences

Keywords

Genetic Algorithm Substitution Techniques Steganography Steggen