A Steganography Technique Based on the Huffman Codes and PM1 Technique

Sonal Dwivedi, Mohammad Tabrez Nafis

Abstract


In this age of technology, everyday huge amount of data is transferred across the network. The higher the amount of data transmission the larger the amount of security is needed. In this scenario security of the data stands as the basic need and it needs to be addressed and solved first. In this paper combination of a standard table and Plus minus 1 (PM1) steganography using Genetic Algorithm (GA) is proposed which would not only allow transmission of a large amount of data but would also eliminate the need of embedding the look-up table along with the image.

Keywords


Steganography, PM1 technique, LSB matching, Genetic Algorithm, Huffman Code

Full Text:

PDF

References


Holotyak, T., Fridrich, J. and Soukal, D., 2005, March. Stochastic approach to secret message length estimation in±k embedding steganography. In Electronic Imaging 2005 (pp. 673-684). International Society for Optics and Photonics.

Mielikainen, J., 2006. LSB matching revisited. IEEE signal processing letters, 13(5), pp.285-287.

Zhang, L., Wang, H. and Wu, R., 2009. A high-capacity steganography scheme for JPEG2000 baseline system. IEEE Transactions on Image Processing, 18(8), pp.1797-1803.

Yu, L., Zhao, Y., Ni, R. and Zhu, Z., 2009. PM1 steganography in JPEG images using genetic algorithm. Soft Computing, 13(4), pp.393-400.

Chan, C.K. and Cheng, L.M., 2004. Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), pp.469-474.

Wang, R.Z., Lin, C.F. and Lin, J.C., 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern recognition, 34(3), pp.671-683.

Wang, R.Z., Lin, C.F. and Lin, J.C., 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern recognition, 34(3), pp.671-683.

Wang, S., Yang, B. and Niu, X., 2010. A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), pp.28-35.

Tiwari, P., Madaan, N. and Nafis, M.T., 2015. Cryptographic Technique: Base Change Method. International Journal of Computer Applications, 118(14).

Tiwari, P. and Nafis, M.T., 2015. Error Patterns and Analysis of Hindi Shallow Parser. International Journal of Computer Applications, 110(14).

Dwivedi, S. (2016). An optimized steganographic technique. CSI Transactions on ICT, 1-9. doi: 10.1007/s40012-016-0116-x




DOI: https://doi.org/10.26483/ijarcs.v8i5.3542

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science