An enhanced security algorithm for wireless application using RSA and genetic approach

Image steganography is an emerging field of research for secure data hiding and transmission over networks. The proposed system provides the best approach for Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with Visual Cryptography (VC). Original message is converted into cipher text by using RSA and then hidden into the LSB of original image. Genetic Algorithm and Visual Cryptography has been used for enhancing the security. Genetic Algorithm is used to modify the pixel location of stego image and the detection of this message is complex. Visual Cryptography is used to encrypt the visual information. It is achieved by breaking the image into two shares based on a threshold. The performance of the proposed system is experimented by performing steganalysis and conducting benchmarking test for analysing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The main aim of this paper is to design the enhanced secure algorithm which uses both steganography using Genetic Algorithm and Visual Cryptography to ensure improved security and reliability.

[1]  M. Umamaheswari,et al.  Analysis of Different Steganographic Algorithms for Secured Data Hiding , 2010 .

[2]  Shu-Chuan Huang,et al.  Colored digital watermarking technology based on visual cryptography , 2005 .

[3]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[4]  Jamshid Shanbehzadeh,et al.  A steganographic method based on Integer Wavelet Transform and Genetic Algorithm , 2011, 2011 International Conference on Communications and Signal Processing.

[5]  S. Manoharan,et al.  An Empirical Analysis of RS Steganalysis , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.

[7]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[8]  K Jithesh,et al.  MULTI LAYER INFORMATION HIDING -A BLEND OF STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY , 2010 .

[9]  ASCII based Even-Odd Cryptography with Gray code and Image Steganography : A dimension in Data Security , 2011 .

[10]  Chin-Chen Chang,et al.  A new (t, n) threshold image hiding scheme for sharing a secret color image , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[11]  A. Adewumi Some Improved Genetic-Algorithms Based Heuristics for Global Optimization with Innovative Applications , 2010 .

[12]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[13]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[14]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[15]  Shyamalendu Kandar,et al.  Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number , 2011 .

[16]  NEW ALGORITHM FOR HALFTONE IMAGE VISUAL CRYPTOGRAPHY , 2007 .

[17]  K.M. Singh,et al.  Stealth steganography in visual cryptography for half tone images , 2008, 2008 International Conference on Computer and Communication Engineering.

[18]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[19]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.