Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 7

Abstract

Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique. The watermarks are implanted into the HL and LH frequency coefficients in bi-orthogonal wavelet transform (BWT). In order to get better the quality of stego image and robustness of the steganography we have to develop an optimization technique using a model to explore for the optimal locations. We examine the presentation of the suggested technique in terms of Peak signal to Noise ratio (PSNR) and Normalized correlation (NC). The proposed technique is the application of steganography for confidential transmission of symmetric key generated using Genetic algorithm (GA) that can accomplish a good imperceptibility and robustness of the image 

Authors and Affiliations

Samir k Bandyopadhyay, Sabyasachi Pramanik

Keywords

Related Articles

CHBR: Contact History Based Routing in Time Varying Approach

In Delay tolerant network having intermittent connectivity so there is no guarantee of finding a complete communication path that connecting the source and destination. There no any end to end connectivity for delay-tole...

Code Comprehending Measure (CCM)

Software complexity, accurately, plays a vital role in life cycle of the software. Many metrics have been proposed in the past like LOC, McCabes cyclomatic measure, Halsteads measures and cognitive measure...

Nand gate architectures for memory decoder

This paper presents some nand gate design styles which when used in decoder reduces energy consumption and delay. Basically conventional, nor style nand, source coupled nand is discussed. The three designs conventional,...

Test Suite Minimization using Hybrid Algorithm for GA generated Test Cases

Software testing and retesting occurs continuously during the software development lifecycle to detect errors as early as possible. As the software evolves the size of test suites also grows. When the no of test cases ge...

Cloud Requirement and Cloud Analysis

Cloud computing is model which uses combine concept of software-as-a-service and Ĺ“utility computing ,provide convenient and on-demand services to requested end users. Cloud Engineering is a discipline that uses comb...

Download PDF file
  • EP ID EP650209
  • DOI 10.24297/ijct.v10i7.7027
  • Views 77
  • Downloads 0

How To Cite

Samir k Bandyopadhyay, Sabyasachi Pramanik (2013). Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 10(7), 1791-1799. https://europub.co.uk/articles/-A-650209