Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application

Image steganography is an emerging field of research for secure data hiding and transmission over networks. The proposed system provides the best approach for Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with Visual Cryptography (VC). Original message is converted into cipher text by using secret key and then hidden into the LSB of original image. Genetic Algorithm and Visual Cryptography has been used for enhancing the security. Genetic Algorithm is used to modify the pixel location of stego image and the detection of this message is complex. Visual Cryptography is used to encrypt the visual information. It is achieved by breaking the image into two shares based on a threshold. The performance of the proposed system is experimented by performing steganalysis and conducting benchmarking test for analysing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The main aim of this paper is to design the enhanced secure algorithm which uses both steganography using Genetic Algorithm and Visual Cryptography to ensure improved security and reliability.

[1]  NEW ALGORITHM FOR HALFTONE IMAGE VISUAL CRYPTOGRAPHY , 2007 .

[2]  M. Umamaheswari,et al.  Analysis of Different Steganographic Algorithms for Secured Data Hiding , 2010 .

[3]  Shu-Chuan Huang,et al.  Colored digital watermarking technology based on visual cryptography , 2005 .

[4]  ASCII based Even-Odd Cryptography with Gray code and Image Steganography : A dimension in Data Security , 2011 .

[5]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[6]  K Jithesh,et al.  MULTI LAYER INFORMATION HIDING -A BLEND OF STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY , 2010 .

[7]  Shyamalendu Kandar,et al.  Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number , 2011 .

[8]  Chin-Chen Chang,et al.  A new (t, n) threshold image hiding scheme for sharing a secret color image , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[9]  A. Adewumi Some Improved Genetic-Algorithms Based Heuristics for Global Optimization with Innovative Applications , 2010 .

[10]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[11]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[12]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[13]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[14]  S. Manoharan,et al.  An Empirical Analysis of RS Steganalysis , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.

[16]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[17]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[18]  K.M. Singh,et al.  Stealth steganography in visual cryptography for half tone images , 2008, 2008 International Conference on Computer and Communication Engineering.