A Hybrid Image steganography method based on genetic algorithm

the use of internet increases the chances for attackers to detect the information content during the transmission process between two parties. Steganography is a solution to pass messages between two parties in a secure manner. This work proposes a secure method to hide one or more images simultaneously inside cover image with the same size. This method used genetic algorithm technique to generate secret key and to select optimum mixing matrix values. This key will be shared between only the message sender and receiver to ensure that the data sources are kept secure and hard to be detected by untrusted third parties. The results show that the proposed method improves the capability of hiding more than one image process inside the cover image. Also, the proposed method increases the effectiveness of the hiding capacity, security level and robustness to certain attack.

[1]  Shailender Gupta,et al.  Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .

[2]  Ahmed Patel,et al.  Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers , 2015 .

[3]  Bin Luo,et al.  MDE-based image steganography with large embedding capacity , 2016, Secur. Commun. Networks.

[4]  R. Umarani,et al.  A Study on Digital Image Steganography , 2013 .

[5]  S. H. Ali,et al.  Miner for OACCR: Case of medical data analysis in knowledge discovery , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).

[6]  Nurhayati,et al.  Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm , 2016, 2016 4th International Conference on Cyber and IT Service Management.

[7]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[8]  Pallavi Sharma,et al.  A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography , 2016 .

[9]  Samaher Hussein Ali Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.

[10]  A. Korshunov,et al.  Keyterm extraction from microblogs' messages using Wikipedia-based keyphraseness measure , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).

[11]  Samaher Hussein Ali,et al.  A novel tool (FP-KC) for handle the three main dimensions reduction and association rule mining , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).

[12]  Machigar Ongtang,et al.  Elitism Enhancements for Genetic Algorithm based Network Intrusion Detection System , 2013 .

[13]  Liang Xiao,et al.  Sensor-Assisted Security in Cognitive Radio Networks , 2013 .

[14]  Ahmed Patel,et al.  Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments , 2014, 2014 International Congress on Technology, Communication and Knowledge (ICTCK).

[15]  Jing Dong,et al.  Two Notes from Experimental Study on Image Steganalysis , 2013, ICIC.

[16]  Janahanlal Stephen,et al.  Genetic Algorithm based Mosaic Image Steganography for Enhanced Security , 2014 .

[17]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..