Genetic Algorithm Based Steganography Using Wavelets

Steganography has long been a means of secure communication. Security is achieved by camouflaging the secret message. In this paper, we present a Genetic Algorithm based Steganography using Discrete Cosine Transforms(GASDCT) and Genetic Algorithm based Steganography using DiscreteWavelets Transform(GASDWT). In our approach, the Discrete Cosine Transform and Discrete Wavelet Transform are applied to the payload. Genetic Algorithm is used to generate many stego-images based on Fitness functions; one of these which give least statistical evidence of payload is selected as the best stego image to be communicated to the destination. It is observed that GASDWT has an improvement in Bit Error Rate(BER), Peak Signal to Noise Ratio(PSNR) and embedding capacity as compared to GASDCT.

[1]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[2]  M.-R. Akbarzadeh-T,et al.  A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[3]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[4]  Rongrong Ji,et al.  Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[5]  B. S. Manjunath,et al.  Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.

[6]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[7]  Rajarathnam Chandramouli Data hiding capacity in the presence of an imperfectly known channel , 2001, IS&T/SPIE Electronic Imaging.

[8]  Andrew H. Sung,et al.  Defeating the current steganalysis techniques (robust steganography) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[9]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[10]  Alessandro Neri,et al.  Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding , 2002, EURASIP J. Adv. Signal Process..

[11]  Z. Qiu,et al.  A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..

[12]  Chin-Chen Chang,et al.  An effective image steganographic scheme based on wavelet transformation and pattern-based modification , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[13]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[14]  S. Luke,et al.  A Comparison of Crossover and Mutation in Genetic Programming , 1997 .