Skip to main content

A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)

  • Conference paper
Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014

Abstract

The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed framework offers an approach of secure data hiding technique in digital images. Novel scheme, presented encrypts meaningful secret data using nonlinear dynamics (chaos theory) before embedding into host or cover image. A basic LSB embedding method is used for encrypting data into cover image. Genetic Algorithm based pixel adjustment process is used to reduce the difference of error between the host image and its stego version with low distortions. The results of proposed scheme are compared with other steganographic algorithm using Peak Signal to Noise Ratio (PSNR) and Structural Similarity (SSIM) index, color frequency test and StirMark analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rudramath, P.R., Madki, M.R.: High Capacity Data Embedding Technique using Improved BPCS Steganography. International Journal of Scientific and Research Publications 2(7), 1–4 (2012)

    Google Scholar 

  2. Paul, G., Davidson, I., Mukherjee, I., Ravi, S.S.: Keyless Steganography in Spatial Domain Using Energetic Pixels. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 134–148. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Gleick, J.: CHAOS, The Amazing Science of the Unpredictable. Vintage Books (1998)

    Google Scholar 

  4. Ganesan, K., Venkatalakshmi, B., Moothy, R.K.: Steganography Using Enhanced Chaotic Encryption Technique. In: International Conference of Communication Systems (2004)

    Google Scholar 

  5. Tavazoi, M.S., Haeri, M.: An optimization algorithm based on chaotic behavior and fractul nature. Journal of Computational and Applied Mathematics 206, 1070–1081 (2007)

    Article  MathSciNet  Google Scholar 

  6. Alirezaanejad, M., Enayatifar, R.: Steganography by using logistic map function and cellular automata. Research Journal of Applied Sciences, Engineering and Technology, 4991–4995 (2012)

    Google Scholar 

  7. Yu, L., Zhao, Y., Ni, R., Li, T.: Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm. EURASIP Journal on Advances in Signal Processing 2010, 1–6 (2010)

    Google Scholar 

  8. Das, N.G.: Statistical Methods, 1st edn. Tata-McGraw-Hill Education (2008)

    Google Scholar 

  9. Dasgupta, K., Mandal, J.K., Dutta, P.: Hash Based Least Significant Bit Technique For Video Steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM) 1(2), 1–11 (2012)

    Google Scholar 

  10. Dasgupta, K., Mandal, J.K., Dutta, P.: Optimized Video Steganography using Genetic Algorithm (GA). Procedia Computer Science 2013, 1–8 (2013)

    Google Scholar 

  11. Kutter, M., Petitcolas, F.A.P.: A Fair Benchmark For Image Watermarking Systems. In: Electronic Imaging 1999. Security and Watermarking of Multimedia Contents, The International Society for Optical Engineering, vol. 3657, pp. 1–14 (1999)

    Google Scholar 

  12. Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Dutta, P.: A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain. International Journal of Security, Privacy and Trust Management (IJSPTM) 3(1), 11–22 (2014)

    Article  Google Scholar 

  13. Westfield, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. StirMark Benchmark, http://www.petitcolas.net/fabien/watermarking/stirmark

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debiprasad Bandyopadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Dutta, P., Ojha, V.K., Snášel, V. (2014). A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO). In: Kömer, P., Abraham, A., Snášel, V. (eds) Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014. Advances in Intelligent Systems and Computing, vol 303. Springer, Cham. https://doi.org/10.1007/978-3-319-08156-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08156-4_27

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08155-7

  • Online ISBN: 978-3-319-08156-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics