Genetic Algorithm in Audio Steganography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-13 Number-1                          
Year of Publication : 2014
Authors : Manisha Rana , Rohit Tanwar


Manisha Rana , Rohit Tanwar. "Genetic Algorithm in Audio Steganography", International Journal of Engineering Trends and Technology (IJETT), V13(1),29-34 July 2014. ISSN:2231-5381. published by seventh sense research group


With the advancement of communication technology, data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an emerging component of AI to provide suboptimal solutions. In this paper the use of GA in Steganography is explored to find future scope of research.


[1] Muhalim Mohamed Amin, Subariah Ibrahim, Mazleena Salleh, Mohd Rozi Katmin “INFORMATION HIDING USING STEGANOGRAPHY” Department of Computer System & Communication Faculty of Computer Science and Information system, UNIVERSITI TEKNOLOGI MALAYSIA, 2003, url:
[2] Samir Kumar Bandyopadhyay*1, Tuhin Utsab Paul2 and Avishek Raychoudhury3,” Genetic Algorithm Based Substitution Technique Of Imagesteganography”, Journal of Global Research in Computer Science ISSN-2229-371X , Volume 1, No. 5, December 2010
[3] Lifang Yu • Yao Zhao • Rongrong Ni • Zhenfeng Zhu, “PM1 steganography in JPEG images using genetic algorithm” Soft Comput (2009) 13:393–400 DOI 10.1007/s00500-008-0327-7 Published online: 3 June 2008
[4] Mazdak Zamani1, Azizah A. Manaf2, Rabiah B. Ahmad3, Akram M. Zeki4, and Shahidan Abdullah5, “A Genetic-Algorithm-Based Approach for Audio Steganography”, World Academy of Science, Engineering and Technology 54 2009
[5] Christine K. Mulunda,Peter W. Wagacha, Alfayo O. Adede,”Genetic Algorithm Based Model in Text Steganography”, African Journal of Information Systems ISSN:1936-0282, Vol.-5 Issue-4,Oct.-2013
[6] R.J. Anderson, F.A.P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected Area in Communications, pp. 474-481, May 1998.
[7] M. Ramkumar & A.N. Akansu. “Some Design Issues For Robust Data hiding Systems”, url:>
[8] N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998.
[9] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, pp. 26-34, 1998

HAS, SecretData , Genetic Algorithm, Mutation, Chromosome