We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

EA based Heuristic Segmentation for Efficient Data Hiding

by Raniyah Abdullah Wazirali, Zenon Chaczko
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 5
Year of Publication: 2015
Authors: Raniyah Abdullah Wazirali, Zenon Chaczko
10.5120/20738-3126

Raniyah Abdullah Wazirali, Zenon Chaczko . EA based Heuristic Segmentation for Efficient Data Hiding. International Journal of Computer Applications. 118, 5 ( May 2015), 1-7. DOI=10.5120/20738-3126

@article{ 10.5120/20738-3126,
author = { Raniyah Abdullah Wazirali, Zenon Chaczko },
title = { EA based Heuristic Segmentation for Efficient Data Hiding },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 5 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number5/20738-3126/ },
doi = { 10.5120/20738-3126 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:50.813662+05:30
%A Raniyah Abdullah Wazirali
%A Zenon Chaczko
%T EA based Heuristic Segmentation for Efficient Data Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 5
%P 1-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information concealment is of paramount importance in information and communication security. For the protection of information and intellectual property, effective techniques are needed. Steganography is the art of writing concealed information in a way that it does not arouse suspicion about its existence. This ensures that only the sender and the recipient are aware of the concealed message existence. Capacity and Stego image imperceptibility are the most crucial aspects. This paper provides a heuristic approach of choosing the right-most regions for embedding that ensure minimum changes to stego object. Then, different percentages of secret data will be hidden on the cluster based on the characteristic of the region. Therefore, the sharp edge region will hide more data while the smooth will hide data. The proposed approach use K-mean clustering to categorized the segmentation and then genetic algorithm will be used to boost the PSNR (peak signal to-noise ratio) value while optimizing high capacity information. The obtained stego object is virtually indistinguishable from the cover object. The experimental results show a significant enhancement over other previous work.

References
  1. Sneha Arora and Sanyam Anand. "A Proposed Method for Image Steganography Using Edge Detection". In: International Journal of Emerging Technology and Advanced Engineering (2013).
  2. K. Bailey and K. Curran. "An Evaluation of Image Based Steganography Methods Using Visual Inspection and Automated Detection Techniques". In: Multimedia Tools and Applications 31 (2006), pp. 55–88.
  3. Muhammad Bilal et al. "Chaos based Zero-steganography algorithm". In: Multimedia Tools and Applications 72. 2 (2013), pp. 1073–1092.
  4. C. K. Chan and L. M. Cheng. "Hiding data in image by Substitution". In: simple LSB Recognition, Pattern 37. 3 (2004), pp. 469–474.
  5. C. -C. Chang and H. -W. Tseng. "A steganographic method for digital images using side match". In: Pattern Recognition Letter 25 (2004), pp. 1431–1437.
  6. J. Fridrich, M. ; Goljan, and Rui Du. "Detecting LSB steganography in color, and gray-scale images". In: MultiMedia, IEEE 8. 4 (2001).
  7. John Holland. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology. Control and Artificial Intelligence. second edition. Cambridge, MA: MIT Press, 1992.
  8. Nitin Jain, Sachin Meshram, and Shikha Dubey. "Image Steganography Using LSB and Edge Detection Technique". In: International Journal of Soft Comput ing and Engineering (IJSCE) 2. 3 (2012).
  9. Saurabh Singh and Gaurav Agarwal. "Use of image to secure text mes sage with the help of LSB replacement". In: International journal of applied engineering research 1 (2010).
  10. R. Z. Wang, C. F. Lin, and J. C. Lin. "Image hiding by optimal LSB substitution and genetic algorithm". In: Pattern Recognition 34 3 (2001), pp. 671–683.
  11. Raniyah Abdullah Wazirali, Zenon Chaczko, and Anup Kale. "Digital multimedia archiving based on optimization steganography system". English. In: 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE). IEEE, Feb. 2014, pp. 82–86.
  12. Wen Jan Chen Chang, Chin Chen, and Hoang Ngan. "High payload steganography mechanism using hybrid edge detector". In: Expert Systems with Applications 37 (2010).
  13. D. -C. Wu and W. -H. Tsai. "A steganographic method for images by pixel-value differencing". In: Pattern Recognition Letters 24 (2003), pp. 1613–1626.
  14. Ma Xiu-ying and Jia-jun Lin. "HVS-Based Imperceptibility Evaluation for Steganography". In: Institute for Computer Science, Social-Informatics and Telecommunications Engineering 2 (2009), pp. 152–161.
  15. Pratheepan Yogarajah et al. "A dynamic threshold approach for skin segmentation in color images". In: 2010 IEEE International Conference on Image Processing. IEEE, Sept. 2010, pp. 2225–2228. URL: http://www. scopus. com/ inward / record . url ? eid = 2 - s2 . 0 - 78651103034 &partnerID=tZOtx3y1.
  16. Youssef Bassil. "Image Steganography based on a Parameterized Canny Edge Detection Algorithm," in: International Journal of Computer Applications 60. 4 (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Steganography LSB K-mean clustering GA