Steganography Using Genetic Encryption Along With Visual Cryptography

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 1
Year of Publication : 2015
Authors : Shruti Sekra, Samta Balpande, Karishma Mulani

pdf
Citation:
MLA Style:

Shruti Sekra, Samta Balpande, Karishma Mulani, "Steganography Using Genetic Encryption Along With Visual Cryptography" SSRG International Journal of Computer Science and Engineering 2.1 (2015): 1-5.

APA Style:

Shruti Sekra, Samta Balpande, Karishma Mulani, (2015). Steganography Using Genetic Encryption Along With Visual Cryptography. SSRG International Journal of Computer Science and Engineering 2.1, 1-5.

Abstract:

Authentication login plays a major rule in today’s world. Due to unavoidable hacking of the databases, it is always quite difficult to trust the information. The project work aims to solve the problem of authenticity. In this paper, we are proposing a technique utilizing image processing, Steganography and visual cryptography, and then dividing it into shares. In this project the message or the text file is taken as an input from the user which needs to get embedded in the image file. The image file can be of the extensions .jpg or .png. It focuses on hiding secret messages inside a cover medium (image). The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. Elitism is used for the fitness function. The model presented here is applied on image files, though the idea can also be used on other file types. Our results show this approach satisfied both security and hiding capacity requirements.

References:

[1] Shyamalendu Kandar, Arnab Maiti, Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number, International Journal of Computer Applications . Volume 19– No.4, April 2011. 
[2] Ravindra Gupta, Akanksha Jain, Gajendra Singh, ―Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics‖ , International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4366 – 4370. . 
[3] Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSB Steganography in Colour and Grayscale Images, Proceedings of ACM Workshop volume 02, Manuscript Code: 11011on Multimedia and Security, Ottawa, October 5, 2001, pp.27-30. . 
[4] Talal Mousa Alkharobi, Aleem Khalid Alvi, New Algorithm for Halftone Image Visual Cryptography, IEEE 2004. . 
[5] Mrs.G.Prema and S.Natarajan, ―Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application‖, IEEE 2012. . 
[6] R. Chandramouli, Nasir Menon, Analysis of LSB Based Image Steganography techniques, IEEE-2001. . 
[7] Arezoo Yadollahpour, Hossein Miar Naimi, Attack on LSB Steganography in Colour and Grayscale Images Using Autocorrelation Coefficients, European Journal of Scientific Research ISSN 1450- 216X Vol.31 No.2 (2009). . 
[8] Ghascmi E shanbchzadch J and ZahirAzami B, ―A Steganographyc method based on Integer Wavelet Transform and Genetic Algorithm International Conference on Communications and Signal Processing (ICCSP) pp 42 45,2011. . 
[9] Dr.M.Umamaheswari Prof. S.Sivasubramanian S.Pandiarajan, Analysis of Different Steganographic Algorithms for Secured Data Hiding, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010. 
[10] Shyamalendu Kandar, Arnab Maiti, Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number, International Journal of Computer Applications (0975 – 8887) Volume 19– No.4, April 2011. 
[11] Anupam Kumar Bairagi, ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security, ISSN 2078-5828 (Print), ISSN 2218-5224 (Online), Volume 01, Issue 02, Manuscript Code: 110112

Key Words:

Genetic Algirithm, Steganography,