Security Analysis of Digital Stegno Images Using Genetic Algorithm

被引:0
|
作者
Praneeta, G. [1 ]
Pradeep, B. [1 ]
机构
[1] Anil Neerukonda Inst Technol & Sci, Dept Comp Sci & Engn, Visakhapatnam, Andhra Pradesh, India
关键词
Optimal pixel adjustment process; Genetic algorithm; simulated annealing; SPAM;
D O I
10.1007/978-3-319-02931-3_31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data hiding is a technique that can embed the secret data in digital images for transmitting messages confidentially through internet. These carriers before transmitting are called cover images and after transmission are called stepno images. An effective stenography algorithm should have lass embedding distortion and capable of evading visual and statistical detection. So there is scope for finding the strength of data hiding technique by considering as optimization problem. Genetic algorithm can solve optimization problems effectively then simulated annealing technique. This paper mainly describes the framework that can analyze security strength of data hiding technique called adaptive pixel pair matching technique and finds penalization parameter and kernel parameter. This paper follows subtractive pixel adjacency matrix model and Experimental results depicted that Genetic algorithm gives better performance than the simulated annealing Technique.
引用
收藏
页码:277 / 283
页数:7
相关论文
共 50 条
  • [31] Research on Information Images in Digital Media Using an Improved Digital Watermarking Algorithm
    Sun, Ying
    Ma, Guofeng
    Zhao, Shumei
    International Journal of Network Security, 2024, 26 (01) : 142 - 148
  • [32] On the security of digital signature algorithm
    Liu, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 362 - 367
  • [33] On the security of the Digital Signature Algorithm
    Blake, IF
    Garefalakis, T
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 87 - 96
  • [34] Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
    Evsutin, Oleg
    Dzhanashia, Kristina
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 15
  • [35] AUTHENTICATION AND SECURITY MECHANISMS FOR DIGITAL IMAGES
    WONG, ST
    HUANG, HK
    GOULD, RG
    RADIOLOGY, 1995, 197 : 258 - 258
  • [36] Capacity analysis of steganography based on the digital images under the constraints of security
    Jiang, Cuiling
    Lin, Jiajun
    Pang, Yilin
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 909 - 912
  • [37] Minimization of Combinational Digital Circuit Using Genetic Algorithm
    Sharma, Peeyush
    Sasamal, Trailokya Nath
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 873 - 876
  • [38] Diffusion and Encryption of Digital Image Using Genetic Algorithm
    Das, Subhajit
    Mandal, Satyendra Nath
    Ghoshal, Nabin
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 729 - 736
  • [39] Water marking on digital image using genetic algorithm
    Cauvery, N.K.
    International Journal of Computer Science Issues, 2011, 8 (6 6-2): : 323 - 331
  • [40] FFT-based homogenization algorithm using digital images
    Terada, K
    Suzuki, K
    Ohtsubo, H
    MATERIALS SCIENCE RESEARCH INTERNATIONAL, 1997, 3 (04): : 231 - 236