Edge Based LSBMR Scheme for Hiding Secret Messages with Genetic Algorithms

  • P. M. Siva Raja
  • E. Baburaj
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 221)


Modern information hiding technology is an important branch of information security. Hiding capacity is very much important for efficient covert communication. The redundancies of digital media as well as the characteristic of human visual system make hiding technology a significant one. Steganography is the Art and Science of writing hidden messages in such a way that no one, apart from the sender and intended recipient suspects the existence of the message. Images are the mostly cover objects used for information hiding schemes. Image steganography is the most popular method for message concealment. Many different carrier file formats can be used, but digital images are the common, because of their frequency in the Internet. In this paper LSB Matching Revisited (LSBMR) image steganography using Genetic Algorithm (GA) is proposed, in which Genetic algorithm is used to select the embedding regions according to the size of the secret message and to optimize the threshold value of the selected image regions. Experimental analysis shows that the proposed algorithm outperforms the existing methods in terms of capacity and security.


Steganography Message concealment Information hiding Region selection Genetic algorithms 


  1. 1.
    Yang CH, Weng CY, Wang SJ et al (2008) Adaptive data hiding in edge areas of images with spatial lsb domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497CrossRefGoogle Scholar
  2. 2.
    Dumitrscu S, Wu X, Wang Z (2003) Detection of LSB steganography via Sample pair analysis. IEEE Trans Sig Process. 51(7):1995–2007CrossRefGoogle Scholar
  3. 3.
    Zhang T, Ping X (2003) A new approach to reliable detection of lsb steganography in natural image. Sig Process J 83: 2085–2093Google Scholar
  4. 4.
    Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition Society, Published by Elsevier Science Ltd. pp.671–683Google Scholar
  5. 5.
    Anderson RJ (1996) Stretching the limits of steganography. In: Proceeding first international workshop information hiding (IH’96), 39–48 1996Google Scholar
  6. 6.
    Ramezani M, Shahrokh (2010) Adaptive image steganoraphy with mod-4 embedding using image contrast. IEEE CCNC 2010 ProceedingsGoogle Scholar
  7. 7.
    Luo W, Hunang F, Huang J (2010) edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2)Google Scholar
  8. 8.
    Information hiding techniques for steganography and digital watermarking. S. Katzenbeizzer and F.A.Petticolas, eds. Artech House, 2000Google Scholar
  9. 9.
    Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214MathSciNetCrossRefGoogle Scholar
  10. 10.
    Ramezani M, Ghaemmaghami S (2010) Towards Genetic Feature Selection in Image Steganalysis. In: 6th IEEE international workshop on digital rights management, Las Vegas, USAGoogle Scholar
  11. 11.
    Mielkainen (2006) LSB matching revisited. IEEE Sig process Lett 13: 285–287Google Scholar
  12. 12.
    Wang RZ, Lin CF (2001) Image hiding by optimal LSB substitution and genetic algorithm, pattern recognition, Vol. 34. ELSEVIER pp 671–883Google Scholar
  13. 13.
    Cachin C (1998) An information-theoretic model for steganography. In: Proceedings second in int’l workshop information hiding (IH’98), 306–318 1998Google Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Research ScholarSathyabama UniversityChennaiIndia
  2. 2.Department of Computer Science and EngineeringSun College of Engineering and TechnologyNagercoilIndia

Personalised recommendations