Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 7
Abstract
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique. The watermarks are implanted into the HL and LH frequency coefficients in bi-orthogonal wavelet transform (BWT). In order to get better the quality of stego image and robustness of the steganography we have to develop an optimization technique using a model to explore for the optimal locations. We examine the presentation of the suggested technique in terms of Peak signal to Noise ratio (PSNR) and Normalized correlation (NC). The proposed technique is the application of steganography for confidential transmission of symmetric key generated using Genetic algorithm (GA) that can accomplish a good imperceptibility and robustness of the image
Authors and Affiliations
Samir k Bandyopadhyay, Sabyasachi Pramanik
Role of Adjacency Matrix & Adjacency List in Graph Theory
Today, graph theory has become major instrument that is used in an array of fields. Some of these include electrical engineering, mathematical research, sociology, economics, computer programming/networking, business adm...
Web Service Negotiation Using AHP for Business Oriented Design of Service Level Agreements
The service purchaser needs to stipulate for the service. The service contributor will afford the service to the purchaser.The powerful use of services to assemble business processes in service computing pressures that t...
A Novel VLSI Architecture for SPHIT Encoder
In this Paper we propose a highly scalable image compression scheme based on the set partitioning in hierarchical trees (SPIHT) algorithm. Our algorithm called highly scalable SPIHT (HS-SPIHT), supports spatial and SNR s...
Digital Fingerprinting In Encrypted Domain
Digital fingerprinting is a method for protecting multimedia content from illegal redistribution and identified the colluders.In copy protection, a content seller embeds a unique identity as a watermark into the content...
Solutions of Linear and Nonlinear Volterra Integral Equations Using Hermite and Chebyshev Polynomials
The purpose of this work is to provide a novel numerical approach for the Volterra integral equations based on Galerkin weighted residual approximation. In this method Hermite and Chebyshev piecewise, continuous and diff...