Open Access Open Access  Restricted Access Subscription or Fee Access

Steganography Using Genetic Algorithm Along with Visual Cryptography for Mobile Environment Applications

S. Jagadeesan

Abstract


The term image steganography is an important field in the term of research for securing the data and transmission through networks. The current system proves the important procedure for minimum bits which relay on steganography which is based on Genetic Algorithm (GA) through the Visual Cryptography (VC). The real message is changed into cipher text with the help of secret key and then store into the LSB of real image. The things like Genetic Algorithm and Visual Cryptography is mainly used for ensure the security concepts. Genetic Algorithm is can easily modify the pixel content as well as the location of stego image. Visual Cryptography is mainly focused on encrypting the visual data. This can be easily done by dividing the image into two share base on a threshold. The result of the current system is analyzed by doing the steganalysis and also conducting the various test cases for analyzing the mile stones to improve the quality factors. The main objectives of this current system are to develop an enhanced secure algorithm which includes the cryptography plays an important role in terms of both security as well as reliability.


Keywords


Steganography, Visual Cryptography, Genetic Algorithm, Steganalysis, Mean Squared Error, Peak Signal to Noise Ratio, Least Significant Bit.

Full Text:

PDF

References


. Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSB Steganography in Color and Grayscale Images, Proceedings of ACM Workshop on Multimedia and Security, Ottawa, October 5, 2001, pp.27-30.

. Sathiamoorthy Manoharan, an empirical analysis of rs steganalysis, proceedings of the third international conference on internet monitoring and protection, IEEE computer society Washington, 2008.

. Rita Rana, Dheerendra Singh, Steganography Concealing Messages inImages Using LSB Replacement Technique with Pre Determined RandomPixel and Segmentation of Image, International Journal of Computer Science&Communication Vol. 1, No. 2, July-December 2010, pp. 113-116.

. Singh, K.M.; Nandi, S.; Birendra Singh, S.; ShyamSundar Singh, L.; ,Stealth steganography in visual cryptography for half tone images, Computerand Communication Engineering, International Conference, 2008.

. Jithesh K, Dr. A V Senthil Kumar, Multi-Layer Information Hiding -A Blend of Steganography and Visual Cryptography, Journal of Theoritical and Applied Information Technology, 2010.

. Hsien-Chu Wu; Chwei-Shyong Tsai; Shu-Chuan Huang;, Colored digitalwatermarking technology based on visual cryptography, Nonlinear Signal and Image Processing, IEEE-Eurasip, 2005.

. R. Chandramouli, Nasir Menon, Analysis of LSB Based ImageSteganography techniques, IEEE-2001.

. Arezoo Yadollahpour, Hossein Miar Naimi, Attack on LSBSteganography in Colour and Grayscale Images Using AutocorrelationCoefficients, European Journal of Scientific Research ISSN 1450- 216XVol.31 No.2 (2009).

. Qing zhong Liu, Andrew H. Sung, Jianyun X, Bernardete M. Ribeiro,.”Image Complexity and Feature Extraction for Steganalysis of LSBMatching”, the 18th International Conference on Pattern Recognition (ICPR'06) 0-7695-2521-0/06 $20.00 © 2006 IEEE.

. J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of jpeg images:Breaking the f5 algorithm. In Proc. of the ACM Workshop on Multimedia ands ecurity 2002, 2002.

. J. Fridrich, M. Goljan, and R. Du. Detecting lsb steganography in color,and gray-scale images. IEEE MultiMedia, pages 22–28, 2001.

. Ghascmi E shanbchzadch J and ZahirAzami B, “ A Steganography method based on Integer Wavelet Transform and Genetic AlgorithmInternational Conference on Communications and Signal Processing(ICCSP) pp 42 45,2011.

. Dr.M.Umamaheswari Prof. S.Sivasubramanian S.Pandiarajan, Analysis of Different Steganographic Algorithms for Secured Data Hiding, IJCSNSInternational Journal of Computer Science and Network Security, VOL.10No.8, August 2010.

. Shyamalendu Kandar, Arnab Maiti, Variable Length Key based VisualCryptography Scheme for Color Image using Random Number, International Journal of Computer Applications. Volume 19– No.4, April 2011.

. Anupam Kumar Bairagi, ASCII based Even-Odd Cryptography withGray code and Image Steganography: A dimension in Data Security, ISSN2078-5828 (Print), ISSN 2218-5224 (Online), Volume 01, Issue 02,Manuscript Code: 110112


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.