Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 7
Abstract
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique. The watermarks are implanted into the HL and LH frequency coefficients in bi-orthogonal wavelet transform (BWT). In order to get better the quality of stego image and robustness of the steganography we have to develop an optimization technique using a model to explore for the optimal locations. We examine the presentation of the suggested technique in terms of Peak signal to Noise ratio (PSNR) and Normalized correlation (NC). The proposed technique is the application of steganography for confidential transmission of symmetric key generated using Genetic algorithm (GA) that can accomplish a good imperceptibility and robustness of the image
Authors and Affiliations
Samir k Bandyopadhyay, Sabyasachi Pramanik
CHBR: Contact History Based Routing in Time Varying Approach
In Delay tolerant network having intermittent connectivity so there is no guarantee of finding a complete communication path that connecting the source and destination. There no any end to end connectivity for delay-tole...
Code Comprehending Measure (CCM)
Software complexity, accurately, plays a vital role in life cycle of the software. Many metrics have been proposed in the past like LOC, McCabes cyclomatic measure, Halsteads measures and cognitive measure...
Nand gate architectures for memory decoder
This paper presents some nand gate design styles which when used in decoder reduces energy consumption and delay. Basically conventional, nor style nand, source coupled nand is discussed. The three designs conventional,...
Test Suite Minimization using Hybrid Algorithm for GA generated Test Cases
Software testing and retesting occurs continuously during the software development lifecycle to detect errors as early as possible. As the software evolves the size of test suites also grows. When the no of test cases ge...
Cloud Requirement and Cloud Analysis
Cloud computing is model which uses combine concept of software-as-a-service and Ĺ“utility computing ,provide convenient and on-demand services to requested end users. Cloud Engineering is a discipline that uses comb...