A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)

  • Debiprasad Bandyopadhyay
  • Kousik Dasgupta
  • J. K. Mandal
  • Paramartha Dutta
  • Varun Kumar Ojha
  • Václav Snášel
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 303)


The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed framework offers an approach of secure data hiding technique in digital images. Novel scheme, presented encrypts meaningful secret data using nonlinear dynamics (chaos theory) before embedding into host or cover image. A basic LSB embedding method is used for encrypting data into cover image. Genetic Algorithm based pixel adjustment process is used to reduce the difference of error between the host image and its stego version with low distortions. The results of proposed scheme are compared with other steganographic algorithm using Peak Signal to Noise Ratio (PSNR) and Structural Similarity (SSIM) index, color frequency test and StirMark analysis.


Image Steganography Spatial Domain Dynamic System Chaotic Maps HVS Steganalysis 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Rudramath, P.R., Madki, M.R.: High Capacity Data Embedding Technique using Improved BPCS Steganography. International Journal of Scientific and Research Publications 2(7), 1–4 (2012)Google Scholar
  2. 2.
    Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  3. 3.
    Gleick, J.: CHAOS, The Amazing Science of the Unpredictable. Vintage Books (1998)Google Scholar
  4. 4.
    Ganesan, K., Venkatalakshmi, B., Moothy, R.K.: Steganography Using Enhanced Chaotic Encryption Technique. In: International Conference of Communication Systems (2004)Google Scholar
  5. 5.
    Tavazoi, M.S., Haeri, M.: An optimization algorithm based on chaotic behavior and fractul nature. Journal of Computational and Applied Mathematics 206, 1070–1081 (2007)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Alirezaanejad, M., Enayatifar, R.: Steganography by using logistic map function and cellular automata. Research Journal of Applied Sciences, Engineering and Technology, 4991–4995 (2012)Google Scholar
  7. 7.
    Yu, L., Zhao, Y., Ni, R., Li, T.: Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm. EURASIP Journal on Advances in Signal Processing 2010, 1–6 (2010)Google Scholar
  8. 8.
    Das, N.G.: Statistical Methods, 1st edn. Tata-McGraw-Hill Education (2008)Google Scholar
  9. 9.
    Dasgupta, K., Mandal, J.K., Dutta, P.: Hash Based Least Significant Bit Technique For Video Steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM) 1(2), 1–11 (2012)Google Scholar
  10. 10.
    Dasgupta, K., Mandal, J.K., Dutta, P.: Optimized Video Steganography using Genetic Algorithm (GA). Procedia Computer Science 2013, 1–8 (2013)Google Scholar
  11. 11.
    Kutter, M., Petitcolas, F.A.P.: A Fair Benchmark For Image Watermarking Systems. In: Electronic Imaging 1999. Security and Watermarking of Multimedia Contents, The International Society for Optical Engineering, vol. 3657, pp. 1–14 (1999)Google Scholar
  12. 12.
    Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Dutta, P.: A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain. International Journal of Security, Privacy and Trust Management (IJSPTM) 3(1), 11–22 (2014)CrossRefGoogle Scholar
  13. 13.
    Westfield, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Debiprasad Bandyopadhyay
    • 1
  • Kousik Dasgupta
    • 1
  • J. K. Mandal
    • 2
  • Paramartha Dutta
    • 3
  • Varun Kumar Ojha
    • 4
  • Václav Snášel
    • 4
  1. 1.Dept. of CSEKalyani Government Engineering CollegeKalyaniIndia
  2. 2.Dept. of CSEKalyani UniversityKalyaniIndia
  3. 3.Dept. of CSSVisva-Bharati UniversitySantiniketanIndia
  4. 4.IT4Innovations & Dept. of Computer ScienceVSB – Technical University of OstravaOstravaCzech Republic

Personalised recommendations