Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
8 pages
1 file
Steganography is defined as the art and science of writing hidden in such a way that no one apart from the sender and the intended recipient even knows that there is a hidden message. One of the most important techniques of Steganography is the Least Significant Bit (LSB) which embeds the secret message in the host image. It is based on replacing the LSBs of the host-image with the secret message bits giving a stego-image. The proposed scheme consists mainly of two phases: In the first phase, we propose a hybrid data hiding scheme incorporates LSB technique with a key permutation method. While in the second phase, we proposed a new scheme for finding the optimal key-permutation by using gene expression programming (GEP). Where, GEP is a powerful evolutionary algorithm for data analysis and combines the advantages of both genetic algorithms (GA) and genetic programming (GP).
Procedia Computer Science
There is a large need of internet applications that requires data to be transmitted in a more secure way. Steganography and cryptography helps in providing data security. Steganography hides the continuation of message by inserting data in some other digital media like image or audio or video format and Cryptography converts data in to cipher text that can be in unreadable format to normal user. For appealing the defence of data thrashing and communication over network, the anticipated system uses cryptographic algorithm along with Steganography. In the anticipated system, the file which we want to make protected is firstly compressed to shrink in size and then the compressed data is transformed into cipher text by using AES cryptographic algorithm and then the encrypted data is concealed in the image. Genetic Algorithm is used for pixel assortment of image where data is to be concealed so that detection of clandestine information become multifarious.
IRAQI JOURNAL OF SCIENCE, 2018
Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to be hiding in the cover image. Experimental results, obtained from different experimental tests, show that our proposed system proves to be more efficient than another steganography technique presented in literature and in comparison with the original cover image in terms of fidelity criteria and degradation quality of the .
iranian journal of electrical and electronic engineering, 2013
This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise Least-Significant-Bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the number of changes of LSB values. His method verifiably reduces the probability of detection and also improves the visual quality of stego images. However, his method still has room for improvement. In this paper, a dual-state scoring model, structured upon genetic algorithm is presented which assesses the performance of different orders for LSB matching and searches for a near-optimum solution among all the permutation orders. Experimental results confirm the superiority of the new approach compared to the Mielikainen's pair-wise LSB matching scheme in terms of distortion.
2010
In this paper, we propose a new image hiding method by using LSB substitution for improving stego-image quality. In this method, we try to transform the secret image into meaningless picture by using a bijective mapping function so that the difference of embedded secret image bits and LSB bits of host image pixels is of minimum possible value. This operation results in the encryption of the secret image. Thus, if grabbers detect existence of the secret image into stego-image, they won't be able to recognize the secret image exactly. As a result, the security of our method will be increased. We use genetic algorithm for setting parameters of bijective mapping function to obtain the best condition in distribution of the pixels. We compare the our proposed method with LSB substitution method and Chang et al.'s method. The experimental results show that our proposed method has enhanced both the quality and the security of stego-image by using LSB substitution method. In addition, our method results are approximately close to the results of Chang et al.'s method.
International Journal of Computer Applications
Encryption is used to securely communicate data in open networks. Each type of data has its own structures; therefore according to the data the different techniques should be used to defend confidential data. Among them digital images are also very popular to carry confidential information in untrusted networks.. For pleasing the defense of data hiding and communication over network, the proposed system uses cryptographic algorithm along with Steganography. In the proposed system, the file which user want to make secure is firstly compressed to shrink in size and then the compressed data is altered into cipher text by using AES cryptographic algorithm and then the encrypted data is concealed in the image. In order to hide the information over the image in complex manner the genetic algorithm based technique is implemented which is used to evaluate the valuable pixels where the data can be hide in a secure manner. In addition of that, for hiding the information in images, the LSB (least significant bits) based steganographic method is used after the selection of eligible pixels. The implementation of the anticipated technique is performed using JAVA technology and for performance evaluation the time and space complexity is computed. In addition of that a
2011
Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. Naturally, there are security agents who would like to fight these data hiding systems by steganalysis, i.e. discovering covered messages and rendering them useless. There is currently no steganography system which can resist all steganalysis attacks. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on Genetic Algorithm in this paper. In this paper, we present a novel approach to resolve the remained problems of substitution technique of image steganography. Using the proposed Genetic Algorithm, message bits are embedded into different bits of the pixel grey level values, resulting in increased robustness. The robustness would be increased against those attacks which try to reveal the ...
The new issue is avalaible for free download (Open Acces) on the Journal's website (https://riviste.unimi.it/index.php/SSMD/index)
Ön yazı, CV ya da özgeçmişiniz ile birlikte bir işe başvururken iş yerine verdiğiniz ve sizin işe yönelik motivasyonunuzu, yeteneklerinizi, başvurduğunuz işe nasıl katkı sağlayabileceğinizi açıklayan tek sayfalık bir yazıdır. Ön yazı yazdırmak veya mülakat simülasyonu yapmak isterseniz bize sitemizde bulunan mesaj butonundan, iletişim bölümünden ya da [email protected] adresinden ulaşabilirsiniz. https://essaysepeti.com/on-yazi-ornekleri/
Built environment project and asset management, 2016
Stakeholder perceptions on critical success factors for public-private partnership projects in Nigeria. Built Environment Project and Asset Management, 6 (1). pp. 74-91.
Acústica SPTH 300 Terapia de Habla y Lenguaje Sonido Se define como:
Entre Imagen y Texto: XLI Coloquio Internacional de Historia del Arte, 2023
Cadernos anti-cárcere: Estudos em homenagem ao Professor Alfredo Dolcino Motta, 2024
Yapay Zeka Etiği: Disiplinlerarası Bir Yaklaşım, 2022
Economía: Teoría y Práctica, 2017
Human Ecology
Estudos Avançados, 2005
Illuminazioni, 2019
International Journal of Advances in Engineering and Pure Sciences, 2021
Developmental Cell, 2013
British Journal of Cancer, 2014
Jurnal Komunitas : Jurnal Pengabdian kepada Masyarakat, 2019
Marine Geology, 2018
Neurology, 2001
Autex Research Journal, 2000