CFP last date
20 December 2024
Reseach Article

Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network

by Yogita Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 1
Year of Publication: 2015
Authors: Yogita Patil
10.5120/19791-1470

Yogita Patil . Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network. International Journal of Computer Applications. 113, 1 ( March 2015), 21-23. DOI=10.5120/19791-1470

@article{ 10.5120/19791-1470,
author = { Yogita Patil },
title = { Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 1 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number1/19791-1470/ },
doi = { 10.5120/19791-1470 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:50.115957+05:30
%A Yogita Patil
%T Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 1
%P 21-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of data hiding and transmission over network, this paper proposed system which uses genetic algorithm along with Visual Cryptography. Plain text is converted into cipher text by using any cipher then it is hidden in LSB of image. Genetic Algorithm is used to shuffle pixel location of image so that detection of secret information become complex. Pixel locations are shuffled using Scan code algorithm. Visual cryptography is kind of encryption technique which divide secret image into multiple shares to ensure improved security and reliability.

References
  1. Mrs. G. Prema, S. Natarajan, "Steganography using genetic Algorithm along with visual Cryptography for Wireless Network Application", International conference on information communication and embedded systems (ICICES), 2013.
  2. Fridrich J. , Goljan M. And Du R, "Reliable Detection of LSB Steganography in Color and Grayscale Images", Proceedings of Workshop on Multimedia and Security, Ottawa, pp. 27-30, , October 5 2001.
  3. J. Fridrich, M. Goljan and D. Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm", In Proc. Of the ACM Workshop on Multimedia and Security, 2002.
  4. Chao-Shen Chen, Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology", Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), 2006.
  5. Sozan Abdulla, "New Visual Cryptography Algorithm For Colored Image", Journal of computing, volume 2, issue 4, April 2010.
  6. Divya James, Mintu Philip, "A Novel Anti Phishing framework based on Visual Cryptography", IEEE, 2011.
  7. Kulvinder Kaur, Vineeta Khemchandani, "Securing Visual Cryptographic Shares using Public Key Encryption ", IEEE, 2012.
  8. Souvik Roy and P. Venkateswaran, "Online Payment System using Steganography and Visual Cryptography", Students' Conference on Electrical, Electronics and Computer Science, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Genetic algorithm Steganography Visual cryptography Wireless network.