Security Analysis of Digital Stegno Images Using Genetic Algorithm

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 247)

Abstract

Data hiding is a technique that can embed the secret data in digital images for transmitting messages confidentially through internet. These carriers before transmitting are called cover images and after transmission are called stepno images. An effective stenography algorithm should have lass embedding distortion and capable of evading visual and statistical detection. So there is scope for finding the strength of data hiding technique by considering as optimization problem. Genetic algorithm can solve optimization problems effectively then simulated annealing technique. This paper mainly describes the framework that can analyze security strength of data hiding technique called adaptive pixel pair matching technique and finds penalization parameter and kernel parameter. This paper follows subtractive pixel adjacency matrix model and Experimental results depicted that Genetic algorithm gives better performance than the simulated annealing Technique.

Keywords

Optimal pixel adjustment process Genetic algorithm simulated annealing SPAM 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Channalli, S., et al.: International Journal on Computer Science and Engineering 1(3), 137–141 (2009)Google Scholar
  2. 2.
    Goel, M.K., Jain, N.: A Novel Visual Cryptographic Steganography Technique. International Journal of Computer, Electronics & Electrical Engineering 2(2) (1999) ISSN: 2249 - 9997Google Scholar
  3. 3.
    Hamid, N., Yahya, A., Badlishah Ahmad, R., Al-Qershi, O.M.: Image Steganography Techniques: An Overview. International Journal of Computer Science and Security (IJCSS) 6(3) (2012)Google Scholar
  4. 4.
    Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security Privacy 3(3), 32–44 (2003)CrossRefGoogle Scholar
  5. 5.
    Zhang, W., Zhang, X., Wang, S.: A double layered plus-minus one data embedding scheme. IEEE Signal Process. Lett. 14(11), 848–851 (2007)CrossRefGoogle Scholar
  6. 6.
    Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security 2009, Article ID 658047 (2009), doi:10.1155/2009Google Scholar
  7. 7.
    Wang, J., Sun, Y., Xu, H., Chen, K., Kim, H.J., Joo, S.H.: An improved section-wise exploiting modification direction method. Signal Process. 90(11), 2954–2964 (2010)CrossRefMATHGoogle Scholar
  8. 8.
    Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Process. 90, 727–752 (2010)CrossRefMATHGoogle Scholar
  9. 9.
    Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005)CrossRefGoogle Scholar
  10. 10.
    Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2004)CrossRefMATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAnil Neerukonda Institute of Technology and SciencesVisakhapatnamIndia

Personalised recommendations