Open Access ArticleGo Back Image Steganography for Message Hiding Using Genetic Algorithm
Keywords:
Steganography, Cryptography, Secrete Message, Image ShelterAbstract
Considering the need for higher security in Secrete Message transmission we introduce Image Steganography for Message Hiding Using Genetic Algorithm. We are going to propose a system in which we can share a secrete message without letting anyone know the presence of that message behind any sample image, this term is called Steganography. To make it more powerful and secure than before we are introducing Genetic Algorithm in this technique.
References
Kai Wang, Xukai Zou, Yan Sui. “A Multiple Secret Sharing Scheme based on Matrix Projection”. 33rd Annual IEEE International Computer Software and Applications Conference. Department of Computer and Information Science,0730-3157/09,(400-405), 2013
Guarmeet Kaur, Arati Kochhar. “A Steganography implementation based on LSB and DCT”. International Journal for Science and Emerging Technologies with latest Trends 4(I), (35-41), November 2012
Dr. Mohammad Abbas Fadhil Al-Husainy. “Message Segmentation to Enhance the Security of LSB image Steganography”. International Journal for Computer Science and Application vol 3,no.3,(57-62) 2012
Mantas Paulinas. “A Survey of Genetic Algorithms Applications for Image Enhancement and Segmentation”. ISSN 1392-124X Information Technology and Control.vol 36,no 3,(278-283),2012
lham Ghasemi, Islamic Azad University Science and Research Branch Tehran, Iran. “A Steganographic method based on Integer Wavelet Transform and Genetic Algorithm”, IEEE, 978-1-4244-9799-7/11, (42-45), 2011.
Liping ZHANG, Xiutan WANG, Yong HUANG, Yingning PENG, “A Time Domain Synthesized Binary Phase Code Side lobe Suppression Filter Based on Genetic Algorithm”, Proceedings of ICSP IEEE, 0-7803-5747-7/00, (1907-1910),2000.
S.Geetha, Siva.S.Sivatha Sindhu, Dr.N.Kamaraj, “Evolving GA Classifier for breaking the Steganographic Utilities : Stools, Steganos and Jsteg”, International Conference on Computational Intelligence and Multimedia Applications, IEEE, 0-7695-3050-8/07, (230-234), 2007.
Elham Ghasemi, Shanbehzadeh, “A Steganographic method based on Integer Wavelet Transform and Genetic Algorithm”, IEEE,978-1-4244-9799-7/11,42-45,2011.
Liaojun Pang, Huixian Li, Ye Yao, and Yumin Wang, “A ver- ifiable (t, n) multiple secret sharing scheme and its analyses”, International Symposium on Electronic Commerce and Security, (22–26), 2013.
B.Raja Rao,P.Anil Kumar, “A Novel Information Security Scheme using Cryptic Steganography”, Indian Journal of Computer Science and Engineering ,Vol. 1 No. 4, (327-332),March 2010.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
