Open Access Open Access  Restricted Access Subscription Access

Information Security using Steganographic Method:Genetic Algorithm and Texture Features


Affiliations
1 College of Computing and IT, Shaqra University, Saudi Arabia
 

Objectives: There is an oversized want of web applications that needs the information to be transmitted in a safer method. Steganography and cryptography help in providing information security. Steganography hides the data by inserting the information into another image format. For maintaining the defense of information thrashing and communication over a network, the steganography based anticipated system uses cryptographical based algorithmics by means of Steganography. Method/Statistical Analysis: A combination of Genetic Algorithm (GA) along with the texture featuresis employed in this paper for effective information hiding in image wherever the data is to be hidden so that detection of embedded information becomes multifaceted. Initially the feature extraction is done, and it is combined with the GA. Findings: Within the anticipated system, the data that we would like to create in a protected form is initially compressed to a shrinkable size so that the compressed information is remodeled into cipher text by applying the combination of GA and Texture features algorithmic program. Experiment results reveal that the proposed combination for steganography obtains more accurate results when compared to the other algorithms. Application/Improvements: Future enhancements in the present work would be an enhanced algorithm which can be applied to different types and sizes of images.
User

  • Soleimanpour-Moghadam M. A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain. Iranian Journal of Electrical and Electronic Engineering. 2013; 9(2):67–75.
  • Silman J. Steganography and steganalysis: An overview. SANS Institute; 2001. p. 1–10.
  • Lee YK, Chen LH. High capacity image steganographic model. IEEE Proceedings of Visual Image Signal Processing. 2000; 147(3):288–94. https://doi.org/10.1049/ip-vis:20000341.
  • Ker A. Improved detection of LSB steganography in grayscale image. International Workshop on Information Hiding; 2005. p. 97–115.
  • Mahdavi M, Samavi Sh, Zaker N, Hashemi M. Steganalysis method for LSB replacement based on local gradient of image histogram. Iranian Journal of Electrical and Electronic Engineering. 2008; 4(3):59–70.
  • Xu H, Wang J, Kim HJ. Near-optimal solution to pairwise LSB matching via an immune programming strategy. Information Sciences. 2010; 1201–17. https://doi.org/10.1016/j.ins.2009.12.027.
  • Petitcolas FAP. Introduction to information hiding. Katzenbeisser S, Petitcolas FAP, editors. Information Hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, Inc; 2000.
  • Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal Processing. 2010; 90(3):727–52. https://doi.org/10.1016/j.sigpro.2009.08.010.
  • Daemen J, Rijmen V. The block Cipher Rijndael. LNCS-CARDIS. Springer-Verlag Berlin Heidelberg; 1998. p. 277–84.
  • Harralick RM, Shanmugam K, Dinstein K. Textural features for image classification. IEEE Transaction on System, Man and Cybernetics. 1973; 3(6):610–21. https://doi.org/10.1109/TSMC.1973.4309314.
  • Alghamdi AA. Computerized steganographic technique using fuzzy logic. International Journal of Advanced Computer Science and Applications. 2018; 9(3):1–5.

Abstract Views: 187

PDF Views: 0




  • Information Security using Steganographic Method:Genetic Algorithm and Texture Features

Abstract Views: 187  |  PDF Views: 0

Authors

Abdulrahman Abdullah Alghamdi
College of Computing and IT, Shaqra University, Saudi Arabia

Abstract


Objectives: There is an oversized want of web applications that needs the information to be transmitted in a safer method. Steganography and cryptography help in providing information security. Steganography hides the data by inserting the information into another image format. For maintaining the defense of information thrashing and communication over a network, the steganography based anticipated system uses cryptographical based algorithmics by means of Steganography. Method/Statistical Analysis: A combination of Genetic Algorithm (GA) along with the texture featuresis employed in this paper for effective information hiding in image wherever the data is to be hidden so that detection of embedded information becomes multifaceted. Initially the feature extraction is done, and it is combined with the GA. Findings: Within the anticipated system, the data that we would like to create in a protected form is initially compressed to a shrinkable size so that the compressed information is remodeled into cipher text by applying the combination of GA and Texture features algorithmic program. Experiment results reveal that the proposed combination for steganography obtains more accurate results when compared to the other algorithms. Application/Improvements: Future enhancements in the present work would be an enhanced algorithm which can be applied to different types and sizes of images.

References





DOI: https://doi.org/10.17485/ijst%2F2018%2Fv11i34%2F131381