A Hybrid Curvelet Transform and Genetic Algorithm for Image Steganography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 8
Abstract
In this paper, we present a new hybrid image steganography algorithm by combining two famous techniques which are curvelet transform and genetic algorithm GA. The proposed algorithm is called Hybrid Curvelet Transform and Genetic Algorithm for image steganography (HCTGA). Curvelet transform is a multiscale geometric analysis tool, its main advantage is that it can solve the important problems efficiently and other transforms are not that ideal. Genetic algorithm is a famous optimization algorithm with the aim of finding the best solutions to a given computational problem that maximizes or minimizes a particular function. In the proposed algorithm the cover and secret images are passed through a preprocessing process by applying four different filters to them in order to remove the noise and achieve a better quality to both images before the hiding process. Then the curvelet transform is applied to the cover image to find the curvelet frequencies of the image, and the secret image is hided at the Least Significant Bits (LSB) of the curvelet frequencies of the cover image to reconstruct the stego image. Finally genetic algorithm operations are employed to find different scenarios for the hiding process by rearranging the hiding bits and finally choose the best scenario that can reach a better image quality and a higher Peak Signal to Noise Ratio (PSNR) results.
Authors and Affiliations
Heba Mostafa Mohamed, Ahmed Fouad Ali, Ghada Sami Altaweel
Envisioning Internet of Things using Fog Computing
Internet of Things is the future of the Internet. It encircles a wide scope. There are currently billions of devices connected to the Internet and this trend is expecting to grow exponentially. Cisco predicts there are a...
FPGA-Based Design of High-Speed CIC Decimator for Wireless Applications
In this paper an efficient multiplier-less technique is presented to design and implement a high speed CIC decimator for wireless applications like SDR and GSM. The Cascaded Integrator Comb is a commonly used decimation...
Networking Issues for Security and Privacy in Mobile Health Apps
It is highly important to give social care on the personal information that is collected by mobile health applications. There has been a rise in the mobile applications which are applied in almost all the departments and...
Role of Knowledge Reusability in Technological Environment During Learning
Role of technology and reusability on the knowledge management and knowledge transformation has been analyzed by considering the extended model of Nonaka and Takeuchi which includes the knowledge reuse in the three dimen...
A New Algorithm to Represent Texture Images
In recent times the spatial autoregressive models have been extensively used to represent images. In this paper we propose an algorithm to represent and reproduce texture images based on the estimation of spatial autoreg...