Abstract
Steganography is the technique of hiding confidential information within a media. In this paper a Genetic Algorithm based image authentication technique in transformed domain using haar wavelet transform is proposed. Wavelet transform is applied on sub mask of the source image to obtain transformed coefficients. Bits of the hidden image are embedded on each coefficients of sub mask with BPP of two. The hidden bit positions are chosen in such a way that there is no loss of precession during reverse wavelet transform. Resultant stego image is obtained through inverse transform which is input for the Genetic Algorithm. Genetic algorithm is applied on it to enhance a layer of security. New Generation followed by Crossover is applied on initial population. Reverse process is followed during decoding. The proposed algorithm obtains better image fidelity and high PSNR as compared to existing approach Huang et al [1].
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Huang, H.-Y., et al.: A lossless data hiding based on discrete Haar wavelet transform. In: CIT 2010, 978-0-7695-4108-2/10 $26.00 ©. IEEE (2010), doi:10.1109/CIT.2010.276
Bandyopadhyay, S.K., et al.: Genetic Algorithm based Substitution Technique of Image Steganography. Journal of Global Research in Computer Science 1(5) (December 2010) ISSN: 2229- 371X
Ghasemi, E., et al.: High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm. In: Proc. IMECS 2011, Hong Kong, March 16-18, vol. 1 (1821) ISBN: 978-988-18210-3-4
Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008, Anna University, December 14-17 (2008) ISBN: 978-1-4244-2962-2
Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094
Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication / Secrete Message Transmission Technique (BLIA/SMTT). Association for the Advancement of Modelling and Simulation Technique in Enterprises (AMSE), AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)
Khamrui, A., et al.: An Authentication Technique for Image/ Legal Document. J. Sign. Process. Syst. 67, 187–199 (2012)
Khamrui, A., et al.: An Image Authentication Technique in Frequency Domain using Genetic Algorithm. IJSEA 3(5) (September 2012)
Bin, L., et al.: A Survey of Image Stegaography and Steganalysis. Journal of Information Hiding and Multimedia Sigal Processing 2(2) (April 2011) ISSN: 2073-4212
Wang, S., et al.: A Secure Steganography Method based on Genetic Algorithm. Journal of Information Hiding and Multimedia Sigal Processing 1(1) (January 2010) ISSN: 2073-4212
Allan, G.: Weber, The USC-SIPI Image Database: Version 5, Original release: Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering (October 1997), http://sipi.usc.edu/database/ (last accessed on January 20, 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Khamrui, A., Mandal, J.K. (2014). A Wavelet Transform Based Image Authentication Approach Using Genetic Algorithm (AWTIAGA). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-03107-1_28
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03106-4
Online ISBN: 978-3-319-03107-1
eBook Packages: EngineeringEngineering (R0)