Optimized Information Hiding using Discrete Wavelet Transform and Genetic Algorithm
DOI:
https://doi.org/10.26438/ijcse/v6i8.930938Keywords:
Spatial Domain, Transform Domain, Discrete Wavelet Transform (DWT), Genetic Algorithm, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)Abstract
With rapid advances in the field of communication and information sharing, Steganography – the art of secret communication has gained much attention in recent years. Communicating sensitive information through media like text, sound image and video without being noticed by intruder has become a challenge. Steganography deals with the development of efficient algorithms by a combination of variety of techniques to achieve imperceptibility. This article analyzes the effect of using the Discrete Wavelet Transform for hiding secret data and optimizing it using the genetic algorithm to achieve better results.
References
[1] Jasleen Kour, Deepankar Verma, “Steganography Techniques – A Review Paper”, International Journal of Emerging Research in Management & Technology, Vol.3, Issue.5, pp.132-135, May 2014.
[2] Kodge B.G, “Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue-6, p.p 1-4, Dec 2017.
[3] Samer Atawneh, Ammar Almomani, Putra Sumari, “Steganography in Digital Images: Common Approaches and Tools”, IETE TECHNICAL REVIEW, Vol.30, Issue.4, pp.344-358, July – Aug 2013.
[4] Seyyed Amin Seyyedi, Vasili Sadai, Nick Ivanov, “A Secure Steganography Method Based on Integer Lifting Wavelet Transform”, International Journal of Network Security, Vol.18, No.1, PP. 124-132, Jan 2016.
[5] S.Mudassar, M.Jamal, F.S.Mehmood, M.R.Rehman, “Resistance of Watermarked Image against Solidity Attacks”, International Journal of Scientific Research in Computer Science and Engineering, Vol 5, Issue 4, PP. 31-35, August 2017.
[6] Y.Taouil, E.B.Ameur, A.Souhar, A.El Harraj, M.T.Belghiti, “High Imperceptibility Image Steganography Methods based on HAAR DWT”, International Journal of Computer Applications, Vol.138, No.10, pp.38-43, March 2016.
[7] Hamad A.Al-Korbi, Ali Al-Ataby, Majid A. Al-Taee, Waleed Al-Nuaimy, “Highly Efficient Image Steganography Using HAAR DWT for Hiding Miscellaneous Data”, Jordanian Journal of Computers and Information Technology (JJCIT), Vol.2, No.1, pp.17-36, April 2016.
[8] Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, “High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2011, Vol.I, IMECS 2011, March 16-18 , 2011, Hong Kong.
[9] Prabakaran G, Dr.Bhavani .R, Sankaran.S, “Dual Transform Color Image Steganography”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.3, Special Issue 1, pp.128-135, January 2014.
[10] Shamimunnisabi, Cauvery N.K, “Empirical Computation of RS-Analysis for Building Robust Steganography Using Integer Wavelet Transform and Genetic Algorithm ”, International Journal of Engineering Trends and Technology, Vol.3, Issue 3, pp.448-454, 2012.
[11] Usha .B.A, N.K.Srinath, Pulkita Sarthak, “High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm”, International Journal of Computer Applications, Vol.121- No.14, p.p 30-33, July 2015.
[12] M.Vijay, V.Vignesh Kumar, “Image Steganography Method Using Integer Wavelet Transform”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.3, Special Issue 3, p.p 1207-1210, March 2014.
[13] Hemalatha.S, U.Dinesh Acharya, Renuka.A, Priya R.Kamath, “A Secure and High Capacity Image Steganography Technique”, Signal & Image Processing: An International Journal (SIPIJ), Vol.4, No.1, p.p 83-89, February 2013.
[14] B.L.Lai, L.W.Chang, “Adaptive data hiding for images based on haar discrete wavelet transform ”, Advances in Image and Video Technology, Lecture Notes in Computer Science, p.p 1085-1093, Hsinchu, Taiwan, December 2006.
[15] H.S.M.Reddy, K.B.Raja, “Wavelet based non LSB steganography”, International Conference on Networking and Media Convergence , p.p 111-117, Cario, Egypt, March 2009.
[16] S. A. Seyyedi, V.Sadau, N.Ivanov, “A Secure Steganography Method Based on Integer Lifting Wavelet Transform”, International Journal of Network Security, Vol.18, No.1, pp.124-132, Jan 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
