A Hybrid Curvelet Transform and Genetic Algorithm for Image Steganography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 8
Abstract
In this paper, we present a new hybrid image steganography algorithm by combining two famous techniques which are curvelet transform and genetic algorithm GA. The proposed algorithm is called Hybrid Curvelet Transform and Genetic Algorithm for image steganography (HCTGA). Curvelet transform is a multiscale geometric analysis tool, its main advantage is that it can solve the important problems efficiently and other transforms are not that ideal. Genetic algorithm is a famous optimization algorithm with the aim of finding the best solutions to a given computational problem that maximizes or minimizes a particular function. In the proposed algorithm the cover and secret images are passed through a preprocessing process by applying four different filters to them in order to remove the noise and achieve a better quality to both images before the hiding process. Then the curvelet transform is applied to the cover image to find the curvelet frequencies of the image, and the secret image is hided at the Least Significant Bits (LSB) of the curvelet frequencies of the cover image to reconstruct the stego image. Finally genetic algorithm operations are employed to find different scenarios for the hiding process by rearranging the hiding bits and finally choose the best scenario that can reach a better image quality and a higher Peak Signal to Noise Ratio (PSNR) results.
Authors and Affiliations
Heba Mostafa Mohamed, Ahmed Fouad Ali, Ghada Sami Altaweel
An Algorithm for Solving Natural Language Query Execution Problems on Relational Databases
There continues to be an increased need for non-experts interaction with databases. This is essential in their quest to make appropriate business decisions. Researchers have, over the years, continued to find a methodolo...
An SMS-SQL based On-board system to manage and query a database
Technological advances of recent years have facilitated the use of embedded systems. They are part of our everyday life. Thanks to them, electronic devices are increasingly present in our lives in many forms: Mobile phon...
An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive...
Effective Methods to Improve the Educational Process of Medicine in Bulgaria
The introduction of modern technologies into the educational process of medical students is a challenge of the new era in education, which can increase the success of students and give them confidence in their capabiliti...
Visualization and Analysis in Bank Direct Marketing Prediction
Gaining the most benefits out of a certain data set is a difficult task because it requires an in-depth investigation into its different features and their corresponding values. This task is usually achieved by presentin...