Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation

The least significant bit (LSB) embedding method is one of the most commonly used techniques; it targets the LSB's of the host image to hide the data. This paper deals with three main steganography challenges (i.e. capacity, imperceptibility, and security). This is achieved by hybrid data hiding scheme incorporates LSB technique with a key -permutation method. The paper also proposes an optimal key permutation method using genetic algorithms for best key selection. Both normal and optimized methods are tested with standard images, varying both data size as well as key space. Final experimental results show decrement in computation time when increasing number of keys, at the same time system security improves.

[1]  Eric Cole,et al.  Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .

[2]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[3]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[4]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[5]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[6]  Chin-Chen Chang,et al.  Data Hiding in Images by Hybrid LSB Substitution , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.

[7]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[8]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[9]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[10]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[11]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[12]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[13]  Ian Witten,et al.  Data Mining , 2000 .

[14]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .