Skip to main content

A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT)

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 177))

Abstract

In this paper a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as ANGAFDZT, has been proposed. Z-Transform is applied on 2 x 2 mask of the source image to transform into corresponding frequency domain. Four bits of the hidden image are embedded in each mask of the source image. Resulting image masks are taken as initial population. New Generation, Crossover and Mutation are applied on the initial population to obtain stego image. Genetic algorithm is used to enhance the security level. During the process of embedding, dimension of the hidden image followed by the content of the message/hidden image are embedded. Reverse process is followed during decoding. High PSNR obtained for various images compared to existing Chin-Chen Chang et al.[1] conform the quality of invisible watermark of ANGAFDZT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, C.-C., et al.: Reversible hiding in DCT- based compressed images. Science Direct Information Science 177, 2768–2786 (2007)

    Article  Google Scholar 

  2. Ghoshal, N., Mandal, J.K., et al.: Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM). In: Proceedings of IEEE International Advanced Computing Conference, IACC 2009, Thapar University, Patiala, India, March 6-7 (2009) ISBN:978-981-08-2465-5

    Google Scholar 

  3. Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications, ADCOM 2008, Anna University, December 14-17 (2008)

    Google Scholar 

  4. Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094

    Google Scholar 

  5. Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication / Secrete Message Transmission Technique (BLIA/SMTT). Association for the Advancement of Modelling and Simulation Technique in Enterprises (AMSE), AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)

    Google Scholar 

  6. EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636

    Article  Google Scholar 

  7. Rechberger, C., Rijman, V., Sklavos, N.: The NIST cryptographic Workshop on Hash Functions. In: IEEE Security and Privacy, Austria, vol. 4, pp. 54–56 (January-February 2006)

    Google Scholar 

  8. Pavan, S., Gangadharpalli, S., Sridhar, V.: Multivariate entropy detector based hybrid image registration algorithm. In: IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18–23 (March 2005)

    Google Scholar 

  9. Hashad, A.I., et al.: A Robust Steganography Technique using Discrete Cosine Transform Insertion. In: Enabling Technologies for the New Knowledge Society: ITI 3rd International Conference Information and Communication Technology (2005) ISBN:0-7803-9270-1

    Google Scholar 

  10. Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of information Hiding. IEEE Trans. on Info. Theory 49(3), 563–593 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  11. Dumitrescu, S., Xiaolin, W., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. on Signal processing 51(7), 1995–2007 (2003)

    Article  Google Scholar 

  12. Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Proc. of ICIP, Thissaloniki, Greece, pp. 1019–1022 (2001)

    Google Scholar 

  13. Wang, R.-Z., Lib, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and Genetic algorithm. Pattern Recognition Society (2001)

    Google Scholar 

  14. Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE, San Jose, pp. 296–307 (January 1998)

    Google Scholar 

  15. Weber, A.G.: The USC-SIPI Image Database: Version 5, Original release: Signal and Image Processing Institute, University of Southern California. Department of Electrical Engineering (October 1997), http://sipi.usc.edu/database/ (last accessed on January 20, 2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. K. Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mandal, J.K., Khamrui, A., Chakraborty, S., Sur, P., Datta, S.K., RoyChoudhury, I. (2013). A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT). In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_90

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31552-7_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31551-0

  • Online ISBN: 978-3-642-31552-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics