Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Similar documents
An Image Authentication Technique in Frequency Domain using Genetic Algorithm (IAFDGA)

A New Approach to Compressed Image Steganography Using Wavelet Transform

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Efficient & Secure Data Hiding Using Secret Reference Matrix

Shubha Dubey Dept. of computer science) Radharaman institute of technology and science bhopal, india

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm

Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT).

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Improved Qualitative Color Image Steganography Based on DWT

Data Hiding on Text Using Big-5 Code

Digital Image Steganography Using Bit Flipping

Multilayer Data Embedding Using Reduced Difference Expansion

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Appendix A. Definition of Terms

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

A Novel Information Security Scheme using Cryptic Steganography

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Review On Secrete Sharing Scheme for Color Image Steganography

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Robust DWT Based Technique for Digital Watermarking

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Available online at ScienceDirect

A Formula Diamond Encoding Data Hiding Scheme

Reversible Data Hiding VIA Optimal Code for Image

A Digital Video Watermarking Algorithm Based on LSB and DCT

STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM

A NOVEL METHOD FOR HIDING INFORMATION

Enhancing the Image Compression Rate Using Steganography

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Adaptive Pixel Pair Matching Technique for Data Embedding

Digital image steganography using LSB substitution, PVD, and EMD

A Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting

Overview Of Techniques Of Stegnography On Various Media

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Implementation of ContourLet Transform For Copyright Protection of Color Images

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

A Secure Steganography Technique using DCT and Modified RC4

Genetic algorithm for optimal imperceptibility in image communication through noisy channel

Robust Image Watermarking based on DCT-DWT- SVD Method

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Optimized Watermarking Using Swarm-Based Bacterial Foraging

A reversible data hiding based on adaptive prediction technique and histogram shifting

Data Hiding in Color Images Using Modified Quantization Table

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A Framework to Reversible Data Hiding Using Histogram-Modification

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

LSB Based Audio Steganography Using Pattern Matching

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

An Improved Performance of Watermarking In DWT Domain Using SVD

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

An Improved Reversible Data-Hiding Scheme for LZW Codes

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

Image Steganography Method Using Integer Wavelet Transform

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique

Digital Image Watermarking Using DWT Based DCT Technique

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

Reversible Data Hiding Based on Median Difference Histogram

Extended Adaptive Pixel Pair Matching

2

Metamorphosis of High Capacity Steganography Schemes

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

QR-Code Image Steganography

A Survey of Fragile Watermarking-based Image Authentication Techniques

A New DCT based Color Video Watermarking using Luminance Component

Optimizing Image Steganography using Genetic Algorithm

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image. Priyanka*, Charu Jain** and Geet Sandhu***

International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X

Efficient Image Steganography Using Integer Wavelet Transform

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Transcription:

A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor Department of Computer Science & Engineering, Kalyani Univerasity Abstract Image authentication is done by embedding image/ message in spatial domain or frequency domain. A mask is chosen from the source image in row major order. Bits of the authenticating image are embedded in each byte of the source image block where the position is chosen using hash function. A hash function is a function that takes variable size inputs and return fixed size output. The position will vary from 0 to 4. The hash function is used to find out the position of embedding that vary for every byte of image and is gives more security of the hidden information. The embedding process is repeated throughout the image. The dimension of the authenticating image along with the content are embedded. Genetic Algorithm is used to minimize the difference between the source & embedded image. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction Steganography is the method of hiding digital information within any computer files/ image. Steganography offers an essential alternative to image integrity and authenticity problem. It is a kind of data hiding technique that provides another way of security protection for digital image data. Steganography can be achieved in two ways. One is spatial domain steganography and another is frequency domain steganography. In spatial domain steganography the hidden information is directly embedded into image pixels. In frequency domain steganography the image pixels are first transformed into frequency domain using discrete fourier transformation/ discrete cosine transformation / discrete wavelet transformation etc. then the information is embedded on it. In addition to hide the information Genetic Algorithm is included in the research work to incorporate another layer of security as well as to minimize the difference between the source and embedded image pixel for more sensitive application like military people, research institute and medical diagnosis etc. The most common method to make this alteration is usage of the least-significant bit (LSB) developed through masking, filtering and transformations on the source image. 2. Existing Work The candidate proposed various techniques for image authentication. The techniques are divided into spatial and frequency domain. In spatial domain steganography the authenticating image pixels are directly incorporated in the source image pixel. In frequency domain steganography the candidate used discrete fourier/ discrete cosine/ discrete wavelet transformation to generate the coefficients. Frequency domain steganography offer better security as compared to spatial domain. In addition genetic algorithm is proposed to enhance a layer of security as well as to minimize the difference between the source and embedded image pixel to prevent RS attack. The main objective is to embed authenticating image pixels as much as possible with a bare minimum distortion to achieve high PSNR and good IF. Embedding is initiated by taking a mask from source image. Authenticating image bits are embedded

onto the source image pixel based on some hash function or some predetermined way. In case of frequency domain technique the source image pixels are transformed into transformed domain using DFT/ DCT/ WT etc after which embedding takes place. Genetic algorithm is applied on the embedded stego image to minimize RS attack. Thirty two bits of the stego intermediate image is taken as initial population. New generation followed by crossover and mutation are applied on initial population. Some of the techniques devised by the candidate with result are explained below. 2.1 A framework for block based image authentication (FBIA). This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. The results have been tested through histogram analysis and standard deviation computation of the source image with the embedded image and compared with popular existing steganographic algorithms like S-Tools[13]. 2.2 An authentication technique for image/legal document (ATILD). The paper presents an image/legaldocument authentication and secures message transmission technique by embedding message/image/message-digest into color images. Experimental results are tested with the popular existing steganographic algorithms like S-Tools[13] where the proposed ATILD is capable to hide large volume of data than S-Tools and shows better performance 2.3 A data embedding technique for gray scale image using genetic algorithm (DEGGA). In this proposal image authentication/data hiding technique through steganographic approach using Genetic Algorithm has been studied. Various statistical parameters computed are compared with the existing genetic algorithm based steganographic algorithm Ran et al.[4] which shows that proposed DEGGA obtained better results in terms of PSNR. 2.4 A genetic algorithm based steganography on color images (GASCI).In this approach a Genetic Algorithm based color image authentication/data hiding technique through steganographic approach, termed as GASCI has been proposed. Comparison of PSNR has been made with GASCI and existing approach [5]. 2.5 A data- hiding scheme for digital image using pixel value differencing (DHPVD). In this scheme pixel value differencing based image authentication/data hiding technique through steganographic approach in spatial domain, termed as DHPVD, has been proposed. The numbers of secret bits of the hidden image that are embedded in consecutive two pixels of the source image depend on the difference between the pixels. Experimental results are tested with existing approach [6], [7]. 2.6 A genetic algorithm based steganography in frequency domain (GASFD). Here Genetic Algorithm based color image authentication/data hiding technique through steganographic approach, in frequency domain using Discrete Fourier Transform (DFT) termed as GASFD, has been proposed. 2.7 A novel genetic algorithm based data embedding technique in frequency domain using z transform (ANGAFDZT). In this proposal a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as ANGAFDZT, has been proposed. High PSNR obtained for various images compared to existing approach Chin-Chen Chang et al.[8] conform the quality of invisible watermark of ANGAFDZT. 2.8 An image authentication technique in frequency domain using genetic algorithm (IAFDGA). In this paper Genetic Algorithm based image authentication technique in frequency domain using Z

transformation (IAFDGA) has been proposed. It is seen from Comparison has been made with existing approach [9]. 3. The Techniques 3.1 A novel genetic algorithm based image authentication technique using wavelet transform (ANGAIAWT). In this study a novel Genetic Algorithm based image authentication technique in frequency domain using Haar Wavelet transform has been proposed. The proposed algorithm obtains better image fidelity and high PSNR as compared to existing approach Huang et al [11]. 3.2 A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT). In this paper a Genetic Algorithm based steganographic technique in frequency domain using discrete cosine transform has been proposed. The proposed technique is compared with Chang Chin et al [12] approach in terms of PSNR and capacity. 3.3 A wavelets transform based image authentication approach using genetic algorithm (AWTIAGA). In this paper a Genetic Algorithm based image authentication technique in transformed domain using haar wavelet transform is proposed. The proposed technique obtain better PSNR as well as high embedding capacity as compared to the existing [11]. 4. Result A comparative study of PSNR has been made between various techniques. It has been seen that PSNR is in between 35 to 50 (approx) which is satisfactory as the better value of PSNR improves image quality. In the following plot X axis indicates PSNR where as Y axis denotes the different techniques. It has also been notices that PSNR is gradually increasing which indicates improvement of different techniques. Conclusion Fig 1: Comparison of PSNR for various techniques The main objective is to authenticate image to ensure the security against the RS analysis which is the most notable steganalysis algorithm. It detects the steg-message by the statistic analysis of pixel values. The cover image can be either gray scale or color. The cover and authenticating images are

both benchmark images. it is clear that the proposed techniques obtained high PSNR ratio along with good image fidelity for various images. The payload may be increased based on the requirement. Future Scope In due course of research it is planned for generating some more techniques based on different transformation to enhance the security and authenticity and to authenticate the image/ document more efficiently. List of publications: 1. Ghoshal N., Mandal, J. K., Khamrui A., A Framework for Block based Image Authentication (FBIA), Proceedings of 4th IEEE International Conference on Industrial and Information Systems, ICIIS09, ISBN: 978-1-4244-4837-1, Peradeniya University, Sri Lanka, pp. 343-348, December 28th - 31st, 2009. 2. Mandal, J. K., Ghoshal N., Khamrui A., An Authentication Technique for Image/Legal Document (ATILD), Journal of Signal Processing Systems for Signal, Image, and Video Technology (formerly the Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology) Springer Science+Business Media, LLC 201010.1007/s11265-010-0557-7. 3. Mandal, J.K., and Khamrui, A, A Data Embedding Technique for Gray Scale Image Using Genetic Algorithm (DEGGA), IEEE Sponsored International Conference on Communication, Computing & Security (Proceedings by Excel India Publishers ISBN-978-93-80697-505), NIT Rourkela, pp.19 22 7 9 January 2010. 4. Mandal, J. K., Khamrui, A, A Genetic Algorithm based Steganography on Color Images (GASCI)" International journal of Signal and Imaging Systems Engineering (IJSISE), Indersciences, accepted may 2011. 5. Mandal, J. K., Khamrui, A., A Data- Hiding Scheme for Digital Image using Pixel Value Differencing (DHPVD), International Symposium on Electronic System Design (ISED),Print ISBN:978-1-4577-1880-9, 19-21 December, Kochi, India, 2011. 6. Khamrui, A., Mandal, J. K, A Genetic Algorithm based Steganography in Frequency Domain (GASFD), IEEE 1st International Conference on Communication and Industrial Applications (ICCIA- 2011), Print ISBN: 978-1-4577-1915-8, 26th 28th December, Science City, Kolkata, 2011. 7. Khamrui, A., Mandal, J. K, et. al. A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT), DPPR- 2012, Advances in Intelligent Systems and Computing, 177, ISSN No.:2194-5357, Springer, pp.885-893, July 13-15, Chennai, India(2012). 8. Mandal, J. K., Khamrui, A, An Image Authentication Technique in Frequency Domain using Genetic Algorithm (IAFDGA), International Journal of Software Engineering & Applications(IJSEA), ISSN : 0975-9018 (Online); 0976-2221(Print), Indexed on DOAJ,EBSCO,INSPEC,ProQuest etc.,doi:10.5121/ijsea.2012.3504, Vol. 3, No. 5, pp.39-46, Sept. 2012.(http://airccse.org/journal/ijsea/papers/3512ijsea04.pdf),2012. 9. Khamrui, A., A Novel Genetic Algorithm based Image Authentication technique using Wavelet Transform (ANGAIAWT), Zonal Seminar, The Institute of Electronics and Telecommunication

Engineers Kolkata Centre, ISBN No. 978-93-5126-699-0, pp. 66-71, Salt lake, August 30-31, 2013. 10. Khamrui, A., Mandal, J. K, A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT), accepted on The First International Conference on Computational Intelligence: Modeling, Techniques and Applications, CIMTA-2013, ISBN:978-93-5126-672-3, University of Kalyani, India, Sept. 27-28, 2013. 11. Khamrui, A., Mandal, J. K, A Wavelet Transform based Image Authentication approach using Genetic Algorithm (AWTIAGA), accepted by Computer Society of India, 48 th Annual Convention, Dec 13-15, Visakhapatanam, 2013. References [1] Lifang Yu et al., Improved adaptive LSB steganography based on chaos and genetic algorithm EURASIP Journal on Advances in Signal Processing, Volume 2010, Article ID 876946. doi:10.1155/2010/876946. [2] Elham Ghasemi et al., High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform, Intelligent Control and Innovative Computing, Lecture Notes in Electrical Engineering 110, DOI 10.1007/978-1-4614-1695-1 30. [3] Shen Wang et al., A Secure Steganography Method based on Genetic Algorithm Journal of Information Hiding and Multimedia Signal Processing 2010 ISSN 2073-4212. Volume 1, Number 1, Jan 2010. [4] Ran-Zan Wang, Chi- Fang Lib, and Ja- Chen Lin, Image hiding by optimal LSB substitution and Genetic algorithm, Pattern Recognition Society, Published by Elsevier Science Ltd 2001. [5] Wang, R-Z et Al, Image hiding by Optimal LSB substitution and Genetic Algorithm,Pattern Recognition Society, Published by Elsevier Science Ltd, 2001. [6] Cheng- Huing Yang et al., Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems, IEEE transactions on information forensics and security, VOL. 3, NO. 3, Sept, pp. 488-497, ISSN: 1556-6013, 2008. [7] Chang and H. W. Tseng, A steganographic method for digital images using side match, Pattern Recognit. Lett., vol. 25, no. 12, pp. 1431 1437, 2004. [8] Chin-Chen Chang et al Reversible hiding in DCT- based compressed images, ScienceDirect Information Science vol :177, Pages: 2768-2786, July 2007.