Secure Data Transfer on Color Flower Image Using AES, GA and LSB

Ekta Chauhan

Abstract


a new technique is going to be introducing for data transmission over internet. This research presented image steganography on color flower image using genetic algorithm (GA) and AES with LSB technique. In this paper secret data is encrypted and decrypted by AES is performed to high security. Then improved covert message is identified by GA. This proposed method is executed and key strength of this project is its huge data hiding capability and least distortion in Stego image. This technique is functional over various images and the outcomes show least distortion in altered image. PSNR and entropy help for experimental study.

Keywords


AES; LSB; GA; PSNR

References


Mehdi Hussain and MureedHussain, “ A Survey of Image Steganography Techniques”. International Journal of Advanced Science and Technology 2013

JatinderKaur, Ira Gabba, “Steganography Using RSA Algorithm”. (IJITEE) 2013

Handel, T. &Sandford, M., Hiding data in the OSI network model, Proceedings of the 1st International Workshop on Information Hiding, June (1996).

N. Johnson and S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer, pp. 26-34, February (1998)

E Lin, E Delp, A Review of Data Hiding in Digital Images. Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference (PICS'99), Savannah, Georgia, April 25-28, (1999).

NadeemAkhtar, Shahbaaz Khan, PragatiJohri, “An Improved Inverted LSB Image Steganography”, IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques, 2014.

Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt, “Digital image steganography: Survey and analysis of current methods”, Elsevier, Signal Processing, Vol. 90, pp. 727-752, 18 August 2009.

Tanmay Bhattacharya, NilanjanDey, S. R. BhadraChaudhuri, “A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum” International Journal of Modern Engineering Research, Vol.1, pp. 157- 161, 2012.

Neil F. Johnson, SushilJajodia, “Exploring steganography: Seeing the unseen”, IEEE Computer Journal, Vol. 31, pp. 26–34, 1998.

K. Sakthisudhan, P. Prabhu, “Dual Steganography Approach for Secure Data Communication”, International Conference on Modeling, Optimization and Computing, Elsevier, Procedia Engineering, Vol. 38, pp. 412-417, 2012

karishmarathod, dr.j.p.patra, uditachauhan, “implementation of information security using object Oriented concept”. (ijcsits) 2016

Krishna Bhowal, DebasreeSarkar, S. Biswas, and ParthaPratimSarkar, “Secured Genetic Algorithm Based Image HidingTechnique with Boolean Functions”. International Journal of Network Security 2016

N. Pavani, B. Sarala, “ Secure Data Communication using Cryptography and Steganography Standards” International Journal of Emerging Engineering Research and Technology 2015

Mohammed Salem Atoum and Mohammed M. Abu Shquier, “A Various Issues in Image Steganography that Using LSBTechnique”. International Journal of Computer Networks and Communications Security 2015

Amba Mishra, PrashantJohri, “ A Review on Video Steganography using GA”. IJIACS 2015.

NishantPattani, KishanPatel ,Nirmal Patel, KashyapPandya and Amruta Patel, “2015 IJREST

YamunaDasar, Preethi. P, “ A Secure Image Steganography Based on RSA Algorithm and Random Pixel Selection Technique”. IJRETM-2015

P. Rameshkumar, M. Monisha and B. Santhi, “Enhancement of Information Hiding in AudioSignals with Efficient LSB based Methods”.Indian Journal of Science and Technology 2014

GauravSingh,KuldeepTiwari,Shubhangi Singh, “Audio Steganography using RSA Algorithm and Genetic based Substitution method to Enhance Security”. IJSER © 2014




DOI: http://dx.doi.org/10.19732/10.19732/vol1122016

Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman 
W : http://ijcandi.org
E  : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

Creative Commons License
IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats