Abstract
Data hiding is a technique that can embed the secret data in digital images for transmitting messages confidentially through internet. These carriers before transmitting are called cover images and after transmission are called stepno images. An effective stenography algorithm should have lass embedding distortion and capable of evading visual and statistical detection. So there is scope for finding the strength of data hiding technique by considering as optimization problem. Genetic algorithm can solve optimization problems effectively then simulated annealing technique. This paper mainly describes the framework that can analyze security strength of data hiding technique called adaptive pixel pair matching technique and finds penalization parameter and kernel parameter. This paper follows subtractive pixel adjacency matrix model and Experimental results depicted that Genetic algorithm gives better performance than the simulated annealing Technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Channalli, S., et al.: International Journal on Computer Science and Engineering 1(3), 137–141 (2009)
Goel, M.K., Jain, N.: A Novel Visual Cryptographic Steganography Technique. International Journal of Computer, Electronics & Electrical Engineering 2(2) (1999) ISSN: 2249 - 9997
Hamid, N., Yahya, A., Badlishah Ahmad, R., Al-Qershi, O.M.: Image Steganography Techniques: An Overview. International Journal of Computer Science and Security (IJCSS)Â 6(3) (2012)
Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security Privacy 3(3), 32–44 (2003)
Zhang, W., Zhang, X., Wang, S.: A double layered plus-minus one data embedding scheme. IEEE Signal Process. Lett. 14(11), 848–851 (2007)
Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security 2009, Article ID 658047Â (2009), doi:10.1155/2009
Wang, J., Sun, Y., Xu, H., Chen, K., Kim, H.J., Joo, S.H.: An improved section-wise exploiting modification direction method. Signal Process. 90(11), 2954–2964 (2010)
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Process. 90, 727–752 (2010)
Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6), 441–444 (2005)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Praneeta, G., Pradeep, B. (2014). Security Analysis of Digital Stegno Images Using Genetic Algorithm. In: Satapathy, S., Udgata, S., Biswal, B. (eds) Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. Advances in Intelligent Systems and Computing, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-319-02931-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-02931-3_31
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02930-6
Online ISBN: 978-3-319-02931-3
eBook Packages: EngineeringEngineering (R0)