Preview

Genetic Algorithm

Powerful Essays
Open Document
Open Document
3320 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Genetic Algorithm
c 2010 ISSN 2073-4212 Journal of Information Hiding and Multimedia Signal Processing Ubiquitous International Volume 1, Number 1, January 2010

A Secure Steganography Method based on Genetic Algorithm
Shen Wang, Bian Yang and Xiamu Niu
School of Computer Science and Technology Harbin Institute of Technology 150080, Harbin, China shen.wang@ict.hit.edu.cn; bian.yang@ict.hit.edu.cn; xiamu.niu@hit.edu.cn

Received April 2009; revised August 2009

Abstract. With the extensive application of steganography, it is challenged by steganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on genetic algorithm in this paper. After embedding the secret message in LSB (least significant bit) of the cover image, the pixel values of the steg-image are modified by the genetic algorithm to keep their statistic characters. Thus, the existence of the secret message is hard to be detected by the RS analysis. Meanwhile, better visual quality can be achieved by the proposed algorithm. The experimental results demonstrate the proposed algorithm’s effectiveness in resistance to steganalysis with better visual quality. Keywords: steganography; steganalysis; genetic algorithm; RS algorithm

1. Introduction. Steganography is a branch of information hiding. It embeds the secret message in the cover media (e.g. image, audio, video, etc.) to hide the existence of the message. Steganography is often used in secrete communication. In recent years, many successful steganography methods have been proposed. Among all the methods, LSB (least significant bit) replacing method is widely used due to its simplicity and large capacity. The majority of LSB steganography algorithms embed messages in spatial domain, such as BPCS[?, ?], PVD[?, ?]. Some others, such as Jsteg[?, ?], F5[?], Outguess[?, ?], embed messages in DCT frequency



References: [1] Steganography software for windows, http://members.tripod.com/steganography/stego/software.html. [2] S. C. Chu, H. C. Huang, Y. Shi, S. Y. Wu, and C. S. Shieh, Genetic watermarking for zerotree-based applications. Circuits, Systems, and Signal Processing, vol. 27, no. 2, pp. 171-182, 2008. [3] J. Fridrich, M. Goljan, and R. Du, Detecting lsb steganography in color, and gray-scale images, IEEE MultiMedia, pp. 22–28, 2001. [4] J. Fridrich, M. Goljan, and D. Hogea. Attacking the outguess, Proc. of ACM Workshop Multimedia and Security, 2002. [5] J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of jpeg images: Breaking the f5 algorithm, Proc. of ACM Workshop on Multimedia and Security 2002, 2002. [6] D. E. Goldberg, The genetic algorithms in search, optimization and machine learning, AddisonWesley, 1989. [7] C. T. Hsu, J. Wu, and L. Hidden, Digital watermarks in images, IEEE Trans. Image Processing, pp. 58-68, 1999. [8] H. C. Huang, C. M. Chu, and J. S. Pan, The optimized copyright protection system with genetic watermarking, Soft Computing, vol. 13, no. 4, pp. 333–343, 2009. [9] H. C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K. C. Huang, Progressive watermarking techniques using genetic algorithms, Circuits, Systems, and Signal Processing, vol. 26, no. 5, pp. 671–687, 2007. A Secure Steganography Method based on Genetic Algorithm 35 [10] E. Kawaguchi and R. O. Eason, Principle and application of bpcs-steganography, Proc. of SPIE:Multimedia Systems and Applications, pp. 464–472, 1998. [11] A. R. S. Marcal and P. R. Pereira, A steganographic method for digital images robust to rs steganalysis, Lecture Notes in Computer Science, pp. 1192–1199, 2005. [12] N. Provos, Steganography detection with stegdetect, http://www.outguess.org/detection.php. [13] A. Westfeld, F5-a steganographic algorithm, Proc. of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science,2137.Springer-Verlag, pp. 289–302, 2001. [14] A. Westfeld and A. Pfitzmann, Attacks on steganographic systems, Proc. of Information HidingThird International Workshop, 1999. [15] A. Westfeld and A. Pfitzmann, Attacks on steganographic systems, Lecture Notes in Computer Science, pp. 61–76, 1999. [16] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, pp. 1613–1626, 2003. [17] X. Zhang and S. Z. Wang, Statistical analysis against spatial bpcs steganography, Computer-Aided Design & Computer Graphics, pp. 395–406, 2003. [18] X. Zhang and S. Z. Wang, Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, pp. 331–339, 2004.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    State Key Lab of Novel Software, Department of Computer Science and Technology, Nanjing University, PR China…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Best Essays

    Determining the Porter’s five-point theory on competitive structure is important for a company to survive the stock market competition. The project analysis is based on General Motor’s Company, which has seen ups and downs in its illustrious history. The establishment or entry into the automotive market wasn’t a difficult task for GM. The company’s financial situation was hit with severe competition from foreign rivals and its internal regional alliances. The other external factor that resulted in GM’s bankrupt situation is recession period. Applying, generic decision making strategies made the company recover its lost status and currently leading its way in design, build and selling of cars and trucks. Bargaining stakeholders to elevate the production values is one of the strategies of GM to become global…

    • 348 Words
    • 2 Pages
    Best Essays
  • Powerful Essays

    CSEC 630 Lab Assignment 1 – Introduction to Cryptography. (n.d.). University of Maryland University College. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64–S73.…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Much of the knowledge stolen in an organization takes the form of tacit knowledge that is used regularly but not necessarily in a conscious fashion. This paper covers what is in the medical records, what is not covered by HIPPA, what constitutes fraud and abuse, who has access, how to protect records, how patients get access to records, what rules and laws apply, and how to protect/secure electronic health records. Identity theft is discussed and what patients need to do to prevent it from happening. There are penalties and fines for computer fraud and abuse. Employee internet…

    • 4094 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    After validating the integrity of the image by comparing the MD5 hash, the USB image was processed using the Forensic Tool Kit and WinHex. In the USB drive traces of pornography, narcotics and online gambling was found in carved/deleted data. There were unexpected virtual machines, and uncommon associated software downloads,…

    • 974 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Distortion is often considered as an unfavorable factor in most image analysis. However, it is undeniable that the distortion reflects the intrinsic property of the lens, especially, the extreme wide-angle lens, which has a significant distortion. In this paper, we discuss how explicitly employing the distortion cues can detect the forgery object in distortion image and make the following contributions: 1) a radial distortion projection model is adopted to simplify the traditional captured ray-based models, where the straight world line is projected into a great circle on the viewing sphere; 2) two bottom-up cues based on distortion constraint are provided to discriminate the authentication of the line in the image; 3) a fake saliency map is used to maximum fake detection density, and based on the fake saliency map, an energy function is provided to achieve the pixel-level forgery object via graph cut. Experimental results on simulated…

    • 1832 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.…

    • 789 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Chaos sequences are created by chaotic mapping which are random sequences. These structures are too complex and difficult to analyze and predict [4-8]. Considering these features, many encryption algorithms based on chaos have been investigated and studied extensively [9-14]. In [9] a new image encryption algorithm based on chaotic system and rotation shift is provided. Given that the rotation shift has many features such as simplicity, efficiency and flexibility in different size images which can increase the security of encryption scheme and be resistive against known attacks. Wang and Luan [10] presented a high dimensional permutation bit-level method based on chaos system. Wang et al [11] presented a new color images encryption algorithm based on Logistic mapping and used the combination of confusion and diffusion to reduce relation between color components. In [12], the spatiotemporal chaos is employed to confuse blocks and change pixel values simultaneously. In [13] an image encryption algorithm presented based on bit permutation of three-dimensional matrix. Enayatifar et al designed an image encryption algorithm using the combination of DNA mask and genetic algorithm and used Logistic mapping as a key and initial population generation for genetic algorithm…

    • 1090 Words
    • 5 Pages
    Better Essays