Skip to main content

A Wavelet Transform Based Image Authentication Approach Using Genetic Algorithm (AWTIAGA)

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 248))

Abstract

Steganography is the technique of hiding confidential information within a media. In this paper a Genetic Algorithm based image authentication technique in transformed domain using haar wavelet transform is proposed. Wavelet transform is applied on sub mask of the source image to obtain transformed coefficients. Bits of the hidden image are embedded on each coefficients of sub mask with BPP of two. The hidden bit positions are chosen in such a way that there is no loss of precession during reverse wavelet transform. Resultant stego image is obtained through inverse transform which is input for the Genetic Algorithm. Genetic algorithm is applied on it to enhance a layer of security. New Generation followed by Crossover is applied on initial population. Reverse process is followed during decoding. The proposed algorithm obtains better image fidelity and high PSNR as compared to existing approach Huang et al [1].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, H.-Y., et al.: A lossless data hiding based on discrete Haar wavelet transform. In: CIT 2010, 978-0-7695-4108-2/10 $26.00 ©. IEEE (2010), doi:10.1109/CIT.2010.276

    Google Scholar 

  2. Bandyopadhyay, S.K., et al.: Genetic Algorithm based Substitution Technique of Image Steganography. Journal of Global Research in Computer Science 1(5) (December 2010) ISSN: 2229- 371X

    Google Scholar 

  3. Ghasemi, E., et al.: High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. In: Proc. IMECS 2011, Hong Kong, March 16-18, vol. 1 (1821) ISBN: 978-988-18210-3-4

    Google Scholar 

  4. Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008, Anna University, December 14-17 (2008) ISBN: 978-1-4244-2962-2

    Google Scholar 

  5. Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094

    Google Scholar 

  6. Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication / Secrete Message Transmission Technique (BLIA/SMTT). Association for the Advancement of Modelling and Simulation Technique in Enterprises (AMSE), AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)

    Google Scholar 

  7. Khamrui, A., et al.: An Authentication Technique for Image/ Legal Document. J. Sign. Process. Syst. 67, 187–199 (2012)

    Article  Google Scholar 

  8. Khamrui, A., et al.: An Image Authentication Technique in Frequency Domain using Genetic Algorithm. IJSEA 3(5) (September 2012)

    Google Scholar 

  9. Bin, L., et al.: A Survey of Image Stegaography and Steganalysis. Journal of Information Hiding and Multimedia Sigal Processing 2(2) (April 2011) ISSN: 2073-4212

    Google Scholar 

  10. Wang, S., et al.: A Secure Steganography Method based on Genetic Algorithm. Journal of Information Hiding and Multimedia Sigal Processing 1(1) (January 2010) ISSN: 2073-4212

    Google Scholar 

  11. Allan, G.: Weber, The USC-SIPI Image Database: Version 5, Original release: Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering (October 1997), http://sipi.usc.edu/database/ (last accessed on January 20, 2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amrita Khamrui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Khamrui, A., Mandal, J.K. (2014). A Wavelet Transform Based Image Authentication Approach Using Genetic Algorithm (AWTIAGA). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03107-1_28

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03106-4

  • Online ISBN: 978-3-319-03107-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics