CFP last date
20 January 2025
Reseach Article

A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography

by Pratiksha Sethi, V. Kapoor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 9
Year of Publication: 2016
Authors: Pratiksha Sethi, V. Kapoor
10.5120/ijca2016910425

Pratiksha Sethi, V. Kapoor . A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography. International Journal of Computer Applications. 144, 9 ( Jun 2016), 5-11. DOI=10.5120/ijca2016910425

@article{ 10.5120/ijca2016910425,
author = { Pratiksha Sethi, V. Kapoor },
title = { A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 9 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 5-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number9/25205-2016910425/ },
doi = { 10.5120/ijca2016910425 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:31.774783+05:30
%A Pratiksha Sethi
%A V. Kapoor
%T A Secured System for Information Hiding in Image Steganography using Genetic Algorithm and Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 9
%P 5-11
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is used to securely communicate data in open networks. Each type of data has its own structures; therefore according to the data the different techniques should be used to defend confidential data. Among them digital images are also very popular to carry confidential information in untrusted networks. . For pleasing the defense of data hiding and communication over network, the proposed system uses cryptographic algorithm along with Steganography. In the proposed system, the file which user want to make secure is firstly compressed to shrink in size and then the compressed data is altered into cipher text by using AES cryptographic algorithm and then the encrypted data is concealed in the image. In order to hide the information over the image in complex manner the genetic algorithm based technique is implemented which is used to evaluate the valuable pixels where the data can be hide in a secure manner. In addition of that, for hiding the information in images, the LSB (least significant bits) based steganographic method is used after the selection of eligible pixels. The implementation of the anticipated technique is performed using JAVA technology and for performance evaluation the time and space complexity is computed. In addition of that a comparative study of the proposed technique using the image steganographic technique is also performed in terms of PSNR and MSE. According to the computed performance the proposed technique is adoptable for hiding information in image securely additionally that consumes less space complexity.

References
  1. Xiliang Liu, "Selective encryption of multimedia content in distribution networks: challenges and new directions", Proceedings of Communications, Internet, and Information Technology (CIIT 2003), Scottsdale, AZ, USA, Nov. 2003.
  2. Falesh M. Shelke et al. “Comparison of different techniques for Steganography in images ”International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 2, February 2014.
  3. Pratiksha Sethi and V. Kapoor “A proposed novel architecture for image steganography using Genetic algorithm along with cryptography” ICRTCSE 2016.
  4. M.Kundalakesi, Sharmathi.R and Akshaya.R, “Overview of Modern Cryptography”, International Journal of Computer Science and Information Technologies (IJCSIT), Volume 6, PP. 350-353, 2015.
  5. Manoj Kumar Pandey, Mrs. Deepty Dubey, “Survey Paper: Cryptography The art of hiding Information”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), PP. 3168-3171, Volume 2, December 2013.
  6. Mohammed AbuTaha, Mousa Farajallah and Radwan Tahboub, “Survey Paper: Cryptography Is the Science of Information Security”, International Journal of Computer Science and Security (IJCSS), PP. 298- 309, Volume 5, 2011.
  7. Prakash Kuppuswamy, and Saeed Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, MIS Review: An International Journal, Volume 19, No. 2, PP. 1-13, March 2014.
  8. Priyanka B. Kutade and Parul S. Arora Bhalotra “A Survey on Various Approaches of Image Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 109 – No. 3, January 2015
  9. Silman J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001.
  10. Lee Y. K. and Chen L. H., “High capacity image steganographic model”, IEEE Proceedings of Visual Image Signal Processing, Vol. 147, No. 3, pp. 288-294, 2000.
  11. Ker A., “Improved detection of LSB steganography in grayscale image”, Lecture Notesin Computer Science, pp. 97-115, 2005.
  12. Mahdavi, Samavi Sh., Zaker N. & M Hashemi.,“Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram”, Iranian Journal of Electrical & Electronic Engineering, Vol. 4, No. 3, pp. 59-70, 2008.
  13. Manish Trehan and Sumit Mittu, “Steganography and Cryptography Approaches Combined using Medical Digital Images”, International Journal of Engineering Research & Technology (IJERT), Volume 4 June 2015.
  14. David E. Goldbrg, “Genetic Algorithm in Search, Optimization & Machine Learning”,Pearson Education Asia.
  15. Genetic Algorithms for optimization, Programs for MATLAB Version 1.0 User Manual.
  16. Anil Kumar and Rohini Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique” International Journal of Advanced Research in Computer Science and Software Engineering 3(7), July - 2013, pp. 363-372
Index Terms

Computer Science
Information Sciences

Keywords

Steganography AES cryptographic algorithm LSB genetic algorithm.