Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data

Author(s):  
A. H. M. Almawgani ◽  
Adam R. H. Alhawari ◽  
Ayman Taher Hindi ◽  
Waled Hussein Al-Arashi ◽  
A. Y. Al-Ashwal

Typically, hackers are ready to hack the confidential documents for their vested interests. The main challenge is to construct a secure relation between the secret message and image quality. To avoid dangerous illegal attacks by the third person, a scheme is proposed to have a combination of cryptography and image steganography techniques. This scheme will enable the security, secret message and image cannot be extracted. The International Data Encryption Algorithm (IDEA) cryptographic algorithms and Discrete Cosine Transform (DCT) based steganography algorithm is chosen for the functionality. Cryptography is used to encrypt and decrypt the document. Steganography to hide document inside an image with increasing payload for the secure transmission of confidential data across the internet. In this paper we present a single application to hide the information by the sender, which is so important document and confidential in the form of files, it will be invisible to unauthorized person. The results of a suggested scheme with respect to PSNR of 90.06 dB with a payload of 52,400 bytes of information in an image.


Author(s):  
Sabyasachi Pramanik ◽  
R P Singh ◽  
Ramkrishna Ghosh

<p>Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using Image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually an acronym for: "<strong>C</strong>ompletely <strong>A</strong>utomated <strong>P</strong>ublic <strong>T</strong>uring test to tell <strong>C</strong>omputers and <strong>H</strong>umans <strong>A</strong>part". It is a type of challenge–response test used in computing to determine whether or not the user is a human. Websites implement CAPTCHA codes into their registration processes due to spam. This is the utility of CAPTCHA codes. Here we generate CAPTCHA codes and later send them in an encrypted version. So, actually CAPTCHA codes are embedded into cover image with an encrypted form resulting stego image and thus attackers cannot fetch the actual CAPTCHA resulting in a secured transmission of confidential data using image steganography.</p>


Word ’Steganography’ is originated from Greekand has been used in several forms for 2500 years which is a art of hiding confidential data in any digital manner in such a way that no one can concealed it. It has found practise in various section like in military, government, diplomatic, medical, personal and intelligence agencies. This survey paper put the light on the basic of image steganography along with its different techniques and sub-techniques. Cover selection with recent trend ROI (region Of Interest) is highlighted. In addition, different types of Image file used in image steganography and performance parameter are discuss well.


2021 ◽  
Vol 15 (3) ◽  
pp. 48-64
Author(s):  
Sabyasachi Pramanik ◽  
Debabrata Samanta ◽  
Samir Kumar Bandyopadhyay ◽  
Ramkrishna Ghosh

Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic algorithm (GA). They use PSO to take the enhanced version of cover image. They use BWT to choose the selective sub bands of cover image and we utilize GA to select a particular stego image among a set of stego images. Thus, an innovative technique of image steganography has been made to transmit confidential data via cover image generating stego image. This combinational approach of image steganography is quite safe for confidential data transmission and makes it hard for the attackers to retrieve the confidential data.


1996 ◽  
Vol 47 (4) ◽  
pp. 550-561 ◽  
Author(s):  
Kathryn A Dowsland
Keyword(s):  

2018 ◽  
Vol 1 (1) ◽  
pp. 2-19
Author(s):  
Mahmood Sh. Majeed ◽  
Raid W. Daoud

A new method proposed in this paper to compute the fitness in Genetic Algorithms (GAs). In this new method the number of regions, which assigned for the population, divides the time. The fitness computation here differ from the previous methods, by compute it for each portion of the population as first pass, then the second pass begin to compute the fitness for population that lye in the portion which have bigger fitness value. The crossover and mutation and other GAs operator will do its work only for biggest fitness portion of the population. In this method, we can get a suitable and accurate group of proper solution for indexed profile of the photonic crystal fiber (PCF).


Sign in / Sign up

Export Citation Format

Share Document