A Hybrid Image steganography method based on genetic algorithm

作者: Samaher Al-Janabi , Ibrahim Al-Shourbaji

DOI: 10.1109/SETIT.2016.7939903

关键词:

摘要: the use of internet increases chances for attackers to detect information content during transmission process between two parties. Steganography is a solution pass messages parties in secure manner. This work proposes method hide one or more images simultaneously inside cover image with same size. used genetic algorithm technique generate secret key and select optimum mixing matrix values. will be shared only message sender receiver ensure that data sources are kept hard detected by untrusted third The results show proposed improves capability hiding than image. Also, effectiveness capacity, security level robustness certain attack.

参考文章(13)
Qingxiao Guan, Jing Dong, Tieniu Tan, Two Notes from Experimental Study on Image Steganalysis Intelligent Computing Theories. pp. 411- 420 ,(2013) , 10.1007/978-3-642-39479-9_49
Hamidreza Rashidy Kanan, Bahram Nazeri, A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm Expert Systems With Applications. ,vol. 41, pp. 6123- 6130 ,(2014) , 10.1016/J.ESWA.2014.04.022
Samaher Al-Janabi, Ahmed Patel, Hayder Fatlawi, Kenan Kalajdzic, Ibrahim Al Shourbaji, Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments international congress on technology communication and knowledge. pp. 1- 8 ,(2014) , 10.1109/ICTCK.2014.7033495
Anton Korshunov, Keyterm extraction from microblogs' messages using Wikipedia-based keyphraseness measure international conference on sciences of electronics technologies of information and telecommunications. pp. 925- 931 ,(2012) , 10.1109/SETIT.2012.6482038
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Review: Digital image steganography: Survey and analysis of current methods Signal Processing. ,vol. 90, pp. 727- 752 ,(2010) , 10.1016/J.SIGPRO.2009.08.010
Samaher H Ali, A novel tool (FP-KC) for handle the three main dimensions reduction and association rule mining international conference on sciences of electronics technologies of information and telecommunications. pp. 951- 961 ,(2012) , 10.1109/SETIT.2012.6482042
Samaher H Ali, Miner for OACCR: Case of medical data analysis in knowledge discovery international conference on sciences of electronics technologies of information and telecommunications. pp. 962- 975 ,(2012) , 10.1109/SETIT.2012.6482043
Samaher Hussein Ali, None, Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm international conference on developments in esystems engineering. pp. 259- 269 ,(2013) , 10.1109/DESE.2013.54
Shailender Gupta, Ankur Goyal, Bharat Bhushan, Information Hiding Using Least Significant Bit Steganography and Cryptography International Journal of Modern Education and Computer Science. ,vol. 4, pp. 27- 34 ,(2012) , 10.5815/IJMECS.2012.06.04
Samaher Al-Janabi, Sarvesh Rawat, Ahmed Patel, Ibrahim Al-Shourbaji, Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers International Journal of Electrical Power & Energy Systems. ,vol. 67, pp. 324- 335 ,(2015) , 10.1016/J.IJEPES.2014.12.005