Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm

作者: Samir k Bandyopadhyay , Sabyasachi Pramanik

DOI: 10.24297/IJCT.V10I7.7027

关键词: Normalized correlationWavelet transformMathematicsCryptographyAlgorithmSteganographyEmbeddingPeak signal-to-noise ratioSymmetric-key algorithmRobustness (computer science)

摘要: Embedding maximum information in a stego-image with minimum change its appearance has been major concern image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up competent optimal robust technique. The watermarks are implanted into the HL and LH frequency coefficients bi-orthogonal wavelet transform (BWT). order to get better quality of stego image robustness develop an optimization technique using model explore for locations. We examine presentation suggested terms Peak signal Noise ratio (PSNR) Normalized correlation (NC). proposed is application confidential transmission symmetric key generated that can accomplish good imperceptibility

参考文章(12)
Jan H. P. Eloff, Martin S. Olivier, T. Morkel, An overview of image steganography. information security for south africa. pp. 1- 11 ,(2005)
Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform Lecture Notes in Electrical Engineering. pp. 395- 404 ,(2012) , 10.1007/978-1-4614-1695-1_30
A.M. Fard, M.-R. Akbarzadeh-T, F. Varasteh-A., A New Genetic Algorithm Approach for Secure JPEG Steganography 2006 IEEE International Conference on Engineering of Intelligent Systems. pp. 1- 6 ,(2006) , 10.1109/ICEIS.2006.1703168
Patrizio Campisi, Alessandro Neri, Marco Visconti, Wavelet-based method for high-frequency subband watermark embedding Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series. ,vol. 4209, pp. 344- 353 ,(2001) , 10.1117/12.420837
G. Brisbane, R. Safavi-Naini, P. Ogunbona, High-capacity steganography using a shared colour palette IEE Proceedings - Vision, Image, and Signal Processing. ,vol. 152, pp. 787- 792 ,(2005) , 10.1049/IP-VIS:20045047
Y.K. Lee, L.H. Chen, High capacity image steganographic model IEE Proceedings - Vision, Image, and Signal Processing. ,vol. 147, pp. 288- 294 ,(2000) , 10.1049/IP-VIS:20000341
Hung-Ju Lin, Po-Yueh Chen, A DWT Based Approach for Image Steganography International Journal of Applied Science and Engineering. ,vol. 4, pp. 275- 290 ,(2006) , 10.6703/IJASE.2006.4(3).275
Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan, Genetic watermarking based on transform-domain techniques Pattern Recognition. ,vol. 37, pp. 555- 565 ,(2004) , 10.1016/J.PATCOG.2003.07.003
Sheheryar Malik, Tasneem M. Shah, Zohaib Z. Iqbal, Improving embedding capacity with minimum degradation of stego-image international symposium on biometrics and security technologies. pp. 1- 6 ,(2008) , 10.1109/ISBAST.2008.4547658
Usha B.A ., ANALYSIS OF IMAGE STEGANALYSIS TECHNIQUES TO DEFEND AGAINST STATISTICAL ATTACKS V A SURVEY International Journal of Research in Engineering and Technology. ,vol. 01, pp. 148- 151 ,(2012) , 10.15623/IJRET.2012.0102012