Information Hiding Based on Binary Encoding Methods and Crossover Mechanism of Genetic Algorithms

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 238)


Information hiding for digital images based on a binary encoding method and a crossover mechanism of genetic algorithm is presented in this paper. First, a crossover operation technique is used to change the pixel values of a covert image to form a crossover-operated matrix by using a specific crossover technique. Then, the crossover-operated matrix is encoded into a host image to form an overt image by using a specific encoding rule. The overt image contains eight groups of binary codes, i.e. identification codes, dimension codes, graylevel codes, crossover operating time codes, crossover technique codes, parent organism length codes, starting and ending position codes, and information codes. The parameters are used to encode and hide the covert image. According to the simulation results, the proposed method does well, larger image scrambling degree for the scrambled matrix.


Information hiding Binary encoding Crossover mechanism of genetic algorithm 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Yang, Y.L., Cai, N., Ni, G.Q.: Digital Image Scrambling Technology Based on the Symmetry of Arnold Transform. Journal of Beijing Institute of Technology 15, 216–221 (2006)Google Scholar
  2. 2.
    Li, B., Xu, J.W.: Period of Arnold Transformation and Its Application in Image Scrambling. Journal of Central South University of Technology 12, 278–283 (2005)CrossRefGoogle Scholar
  3. 3.
    Zhou, Y., Agaian, S., Joyner, V.M., Panetta, K.: Two Fibonacci p-code based image scrambling algorithms. In: Proceedings of SPIE, vol. 6812, p. 681215 (2008)Google Scholar
  4. 4.
    Hennelly, B., Sheridan, J.T.: Optical Image Encryption by Random Shifting in Fraction Fourier Domains. Optics Letters 28, 269–277 (2003)CrossRefGoogle Scholar
  5. 5.
    Zhao, J., Lu, H., Fan, Q.: Color Image Encryption Based on Fractional Fourier Transforms and Pixel Scrambling Technique. In: Proceedings of SPIE, vol. 6279, p. 62793B (2007)Google Scholar
  6. 6.
    Meng, X.F., Cai, L.Z., Yang, X.L., Shen, X.X., Dong, G.Y.: Information Security System by Iterative Multiple-phase Retrieval and Pixel Random Permutation. Applied Optics 45, 3289–3295 (2006)CrossRefGoogle Scholar
  7. 7.
    Lin, K.T.: Digital Information Encrypted in an Image Using Binary Encoding. Optics Communications 281, 3447–3453 (2008)CrossRefGoogle Scholar
  8. 8.
    Yu, X.Y., Ren, H., Li, E.S., Zhang, X.D.: A New Measurement Method of Image Encryption. Journal of Physics: Conference Series 48, 408–413 (2006)CrossRefGoogle Scholar
  9. 9.
    Kutter, M., Petitcolas, F.A.P.: A Fair Benchmark for Image Watermarking Systems. In: Proceedings of SPIE, vol. 3657, pp. 226–231 (1999)Google Scholar
  10. 10.
    Shih, T.K., Lu, L.C., Chang, R.C.: An Automatic Image in Paint Tool. In: Proceedings of the Eleventh ACM International Conference on Multimedia, pp. 102–103 (2003)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Mechanical and Computer-Aided EngineeringSt. John’s UniversityNew Taipei CityTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Central UniversityJhongli CityTaiwan

Personalised recommendations