Skip to main content

A Spatial Domain Image Authentication Technique Using Genetic Algorithm

  • Conference paper
  • First Online:
Book cover Computational Intelligence, Communications, and Business Analytics (CICBA 2017)

Abstract

Since the risk associated with transmission of data over networks is the chance of intrusion and hampering of secrecy, safe transmission of hidden image without hindering the cover image is expected as in image steganography. In this paper, a spatial domain type of image authentication technique by means of Genetic Algorithm has been proposed. Genetic Algorithm is used to improve the quality of stego image. High PSNR values are achieved for various images in comparison with some other existing techniques in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Roy, R., et al.: Optimization of stego image retaining information using genetic algorithm with 8-connected PSNR. Procedia Comput. Sci. 60, 468–477 (2015)

    Article  Google Scholar 

  2. Cheddad, A., et al.: A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89(12), 2324–2332 (2009)

    Article  MATH  Google Scholar 

  3. Wang, S., et al.: A secure steganography method based on genetic algorithm. J. Inf. Hiding Multimed. Signal Process. 1(1), 28–35 (2010). ISSN 2073-421

    Google Scholar 

  4. Begum, R., et al.: Best approach for LSB based steganography using genetic algorithm and visual cryptography for secured data hiding and transmission over networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(6) (2014)

    Google Scholar 

  5. Li, X., et al.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177(15), 3099–3109 (2007)

    Article  Google Scholar 

  6. Fard, M.A., et al.: A new genetic algorithm approach for secure JPEG steganography. In: IEEE International Conference Engineering of Intelligent Systems (2006). doi:10.1109/ICEIS.2006.1703168

  7. Chang, C.C., et al.: Sharing secrets in stego image with authentication. Sci. Direct Pattern Recogn. 41(10), 3130–3137 (2008)

    Article  MATH  Google Scholar 

  8. Wang, R.Z., et al.: Hiding data in images by optimal moderately significant bit-replacement. IEEE Electron. Lett. 36(25), 2069–2070 (2000)

    Article  Google Scholar 

  9. Wang, R.Z., et al.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671–683 (2001)

    Article  MATH  Google Scholar 

  10. Jung, K.H.: High-capacity steganographic method based on pixel value differencing and LSB replacement methods. Imaging Sci. J. 54(4), 213–221 (2010)

    Article  Google Scholar 

  11. Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (1989). ISBN 0-201-15767-5

    MATH  Google Scholar 

  12. Holland, J.H.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence. MIT Press, Cambridge (1998). (NB original printing 1975). ISBN 0-262-58111-6

    Google Scholar 

  13. Vo-Van, T., et al.: Modified genetic algorithm-based clustering for probability density functions. J. Stat. Comput. Simul. 87, 1964–1979 (2017)

    Article  MathSciNet  Google Scholar 

  14. Jiang, N., Zhao, N., Wang, L.: Int. J. Theor. Phys. 55: 107 (2016). doi:10.1007/s10773-015-2640-0

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Diotima Dutta Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Khamrui, A., Gupta, D.D., Ghosh, S., Nandy, S. (2017). A Spatial Domain Image Authentication Technique Using Genetic Algorithm. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 776. Springer, Singapore. https://doi.org/10.1007/978-981-10-6430-2_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6430-2_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6429-6

  • Online ISBN: 978-981-10-6430-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics