Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-3                          
Year of Publication : 2012
Authors :  Shamimunnisabi , Cauvery N.K

Citation 

Shamimunnisabi , Cauvery N.K. "Empirical Computation Of Rs - Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm ". International Journal of Engineering Trends and Technology (IJETT). V3(3):448-456 May-Jun 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

The proposed system presents a novel approach of building a secure data hiding technique of Steganography using Integer W avele t Transform along with Genetic A lgorithm. The pr ominent focus of the proposed work is to develop R esistant S ecure - analysis proof design with highest imperceptibi lity. Optimal Pixel Adjustment P rocess is also adopted to minimize the difference error between the input cover image and the embedded - image an d in order to maximize the hiding capacity with low distortions respectively. The analysis is done for mapping function, P eak S ignal to N oise R atio , image histogram, and parameter s of RS analysis. The implementation results highlights that the proposed sec urity measure basically gives better and optimal results in comparison to prior research wor k conducted using wavelets and Genetic A lgorithm

References

[1] T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in HS Venter, JHP Eloff, L Labuschagne and MM Eloff (eds), Proceedings of the Fif th Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically)
[2] R Sridevi, Dr. A Damodaram, Dr. SVL.NARASIMHAM, efficient method of audio steganography by modified lsb algorithm and strong encryption key with enhanced security, Journal of Theoretical and Applied Information Technology, 2009
[3] Chander Kant, Rajender Nath, Sheetal Chaudhary, Biometrics Security using Steganography, International Journal of Security, Volume (2) : Issue (1), 2008
[4] Domenico Bloisi and Luca Iocchi, Image based steganography and cryptography, International Journal of Computer Applications, 2010
[5] V. Lokeswara Reddy, Dr. A. Subramanyam, Dr.P. Chenna Reddy, Implementation of LSB Steganography and its Evaluation for Variou s File Formats, Int. J. Advanced Networking and Applications, Volume: 02, Issue: 05, Pages: 868 - 872 (2011)
[6] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi, A Survey on Image Steganography and Steganalysis, Journal of Information Hiding and Multimedia Signal Pr ocessing, Volume 2, Number 2, April 2011
[7] A. Joseph Raphael, Dr. V. Sundaram, Cryptography and Steganography – A Survey, Int. J. Comp. Tech. Appl., Vol 2 (3), 626 - 630, ISSN:2229 - 6093, 2010
[8] Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar, A Novel Technique for Image Steganography Based on DWT and Huffman Encoding, International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6), 2011
[9] H S Manjunatha Reddy, K B Raja, High capacity and security steganography using discre te wavelet transform, International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (6), 2011
[10] Amin Milani Fard, Mohammad - R. Akbarzadeh, Farshad Varasteh, A New Genetic Algorithm Approach for Secure JPEG Steganography, Engineering of Int elligent Systems, IEEE International Conference, 2006
[11] Yun Q. Shi, Hyoung Joong Kim, Digital Watermarking, 6th International Workshop, IWDW 2007 Guangzhou, China, December 3 - 5, 2007, Proceedings Springer, 2008
[12] Shreelekshmi R, M Wilscy and M Wilscy, Preproce ssing Cover Images for More Secure LSB Steganography, International Journal of Computer Theory and Engineering, Vol. 2, No. 4, August, 2010
[13] Taras Holotyak, Jessica Fridrich, and David Soukal, Stochastic Approach to Secret Message Length Estimation in ±k Em bedding Steganography, Communications and Multimedia Security 2005
[14] Taras Holotyak, Jessica Fridrich, Sviatoslav Voloshynovskiy, Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics, Communications and Multimedia S ecurity 2005
[15] Sos S. Agaian and Juan P. Perez, New Pixel Sorting Method For Palette Based Steganography And Color Model Selection, 2004
[16] Po - Yueh Chen and Hung - Ju Lin, A DWT Based Approach for Image Steganography, International Journal of Applied Science and Engineering 2006. 4, 3: 275 - 290
[17] Kathryn Hempstalk, Hiding Behind Corners: Using Edges in Images for Better Steganography, 2006
[18] Ying Wang and Pierre Moulin, Statistical Modelling and Steganalysis of DFT - Based Image Steganography, Proc. of SPIE Electronic Im aging, 2006
[19] Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi, and Kingo Kobayashi, Integrity Verification of Secret Information in Image Steganography, The 29th Symposium on Information Theory and its Applications (SITA2006), Hakodate, Hokkaido, Japan, Nov. 28 { Dec. 1, 2006
[20] Ms. K. Ramani Dr. E. V. Prasad Dr. S. Varadarajan, Steganography using bpcs to the integer wavelet transformed image , IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.7, July 2007
[21] Farhan Khan and Adnan Abdul - Aziz Gutub, Message Concealment Techniques using Image based Steganography, The 4th IEEE GCC Conference and Exhibition, Gulf International Convention Centre, Manamah, Bahrain, 11 - 14 November 2007.
[22] Anindya Sarkary, Kaushal Solankiyy and B. S. Manjunathy, F urther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis, Proc. SPIE - Security, Steganography, and Watermarking of Multimedia Contents (X), San Jose, California, Jan. 2008.
[23] Adnan Gutub, Mahmoud Ankeer, Muhammad Abu - Gh alioun, Abdulrahman Shaheen, Aleem Alvi, Pixel indicator high capacity technique for RGB image based steganography, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah , Sharjah , U.A.E. 18 – 20 March 2008
[24] Mohammad Ali Bani Younes and Aman Jantan, A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008
[25] Aasma Ghan i Memon, Sumbul Khawaja and Asadullah Shah, STEGANOGRAPHY: A new horizon for safe communication through XML, Journal of Theoretical and Applied Information Technology, 2008
[26] A.A.Zaidan, Fazidah.Othman, B.B.Zaidan , R.Z.Raji, Ahmed.K.Hasan, and A.W.Naji, Sec uring Cover - File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography, Proceedings of the World Congress on Engineering 2009 Vol I WCE 2009, July 1 - 3, 2009, London, U.K.
[27] Vinay Kumar, S. K. Muttoo, Principle of G raph Theoretic Approach to Digital Steganography, Proceedings of the 3rd National Conference; INDIACom - 2009
[28] Shen Wang, Bian Yang and Xiamu Niu, A Secure Steganography Method based on Genetic Algorithm, Journal of Information Hiding and Multimedia Signal Pr ocessing, Volume 1, Number 1, January 2010
[29] Souvik Bhattacharyya and Gautam Sanyal, Data Hiding in Images in Discrete Wavelet Domain Using PMM, World Academy of Science, Engineering and Technology 68 2010
[30] Nadia M. Mohammed, Multistage Hiding Image Technique s, Raf. J. of Comp. & Math’s. , Vol. 7, No. 2, 2010
[31] A. A. Zaidan, B. B. Zaidan, Y. Alaa Taqa, M. Kanar Sami, Gazi Mahabubul Alam and A. Hamid Jalab, Novel multi - cover steganography using remote sensing image and general recursion neural cryptosystem, Inter national Journal of the Physical Sciences Vol. 5(11), pp. 1776 - 1786, 18 September, 2010
[32] Abduljabbar Shaamala, Shahidan M. Abdullah and Azizah A. Manaf, Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011
[33] K B Shiva Kumar, K B Raja, R K Chhotaray, Sabyasachi Pattnaik, Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques, Int. J . Comp. Tech. Appl., Vol 2 (4), 1035 - 1047, IJCTA | July - August 2011
[34] El Safy, R.O. Zayed, H.H. El Dessouki, A. , An adaptive steganographic technique based on integer wavelet transform, Networking and Media Convergence, 2009. ICNM. International Conferenc e, 2009
[35] Bo - Luen Lai and Long - Wen Chang, Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform, Lecture Notes in Computer Science, 2006, Volume 4319/2006, 1085 - 1093, DOI: 10.1007/11949534_109

Keyword
component; Steganography, Genetic Algorithm, R esistant S ecure - Anal ysus, Optimal Pixel Adjustment P rocess , Peak S ignal to N oise R atio .