Open Access   Article Go Back

Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography

Sakshi 1 , A. Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-2 , Page no. 95-99, Feb-2017

Online published on Mar 01, 2017

Copyright © Sakshi , A. Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sakshi , A. Kaur , “Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.95-99, 2017.

MLA Style Citation: Sakshi , A. Kaur "Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography." International Journal of Computer Sciences and Engineering 5.2 (2017): 95-99.

APA Style Citation: Sakshi , A. Kaur , (2017). Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography. International Journal of Computer Sciences and Engineering, 5(2), 95-99.

BibTex Style Citation:
@article{Kaur_2017,
author = {Sakshi , A. Kaur },
title = {Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {95-99},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1186},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1186
TI - Secure Data Hiding Using Neural Network and Genetic Algorithm in Image Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Sakshi , A. Kaur
PY - 2017
DA - 2017/03/01
PB - IJCSE, Indore, INDIA
SP - 95-99
IS - 2
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
772 578 downloads 480 downloads
  
  
           

Abstract

Due to the high growth of Internet and its applications over the network, there is a need of high level of security whilw doing the data to transfer between the networks. Steganography is a technique of hiding the data over the medium so that no one knows that there is any communication going on except the sender and receiver. This paper gives an approach for Image Steganography to improve the level of security for information exchange over the web. The 24-bit RGB image is picked as a cover picture which hides the encrypted secret message inside red, green and blue pixel values. The combination approach of DWT, Masking, Artificial Neural Network (ANN) and Genetic Algorithm (GA) has been implemented on cover image and text data that is to be hidden in cover image is encrypted with Elgamal and AES algorithm (hybrid approach). This technique gives a level of security to the mystery message which makes it troublesome for the gatecrashers to remove the concealed data. A Peak Signal-to-Noise Ratio, Mean Square Error and Decryption Time is calculated which measures the quality of images used. Larger PSNR and lower MSE value indicates lower distortion and hence a better quality of image.

Key-Words / Index Term

Cover image, Stego image, PSNR, MSE, LSB insertion, DWT, Masking, ANN, GA, AES, Elgamal

References

[1]. Dagar E. and Dagar S. , “ LSB Based Image Steganography Using X-Box Mapping”, In the Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) , India, pp. 351-355. 2014.
[2]. Mandeep Kaur Gill and Rupinder Kaur Randhawa , "Comparative Study of Multibit LSB Steganography with Cryptography", International Journal of Computer Sciences and Engineering, Vol.3, Issue-7, pp.120-123, Jul -2015.
[3]. Ross J. Anderson and Fabien A.P. Petitcolas, " On the Limits of Steganography”, IEEE Journal of Selected Areas in Communications, May 1998., Vol.16, No.4, pp. 474-481.
[4]. Vinod. L. B and Nithyanada. C. R, "Visual Cryptographic Authentication for Online Payment System", International Journal of Computer Sciences and Engineering, Vol.03, Issue-8, pp.109-114, Aug -2015
[5]. Nameer N. EL-Emam , “Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm”, World Academy of Science, Engineering and Technology, Vol.2, No.11, Nov 2008, pp. 566-577.
[6]. Imran Khan, “An Efficient Neural Network based Algorithm of Steganography for image”, International Journal of Computer Technology and Electronics Engineering (IJCTEE), Vol.1, No.2, pp. 63-67.
[7]. Atallah M., Shatnawi A., “A New Method in Image Steganography with Improved Image Quality”, Applied Mathematical Sciences, Vol.6, No.79, 2012, pp. 3907-3915 .
[8]. Saravanan V. and Neeraja A., “ Security Issues In Computer Networks And Steganography”, In the Proceedings of the 2013 Intelligent Systems and Control (ISCO), India, pp. 363-366, 2013.
[9]. Wu H. , Huang J. , “Secure Jpeg Steganography By Lsb+ Matching And Multi-Band Embedding” In the Proceedings of the 2011 International Conference on Image Processing (ICIP) , India, pp. 2737-2740, 2011.
[10]. Manoj gowtham. G.V, Senthur.T, Sivasankaran.M, Vikram.M, Bharatha Sreeja.G, “AES BASED STEGANOGRAPH” , International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol.2, No.1, January 2013.
[11]. Arvind Kumar , Km. Pooja, “Steganography-A Data Hiding Technique”, International Journal of Computer Applications, Vol.9, No.7, November 2010.
[12]. Ajit Singh, Swati Malik, “Securing Data by Using Cryptography with Steganography” International Journal of Advanced Research in Computer Science and Software Engineering , Vol.3, No.5, May 2013 .
[13]. Mohammad Ali Bani Younes and Aman Jantan, “A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion” , IJCSNS International Journal of Computer Science and Network Security, Vol.8, No.6, June 2008.