Genetic Algorithm

Topics: Steganography, Genetic algorithm, Optimization algorithms Pages: 11 (3320 words) Published: February 11, 2013
c 2010 ISSN 2073-4212 Journal of Information Hiding and Multimedia Signal Processing Ubiquitous International Volume 1, Number 1, January 2010

A Secure Steganography Method based on Genetic Algorithm
Shen Wang, Bian Yang and Xiamu Niu
School of Computer Science and Technology Harbin Institute of Technology 150080, Harbin, China shen.wang@ict.hit.edu.cn; bian.yang@ict.hit.edu.cn; xiamu.niu@hit.edu.cn

Received April 2009; revised August 2009

Abstract. With the extensive application of steganography, it is challenged by steganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on genetic algorithm in this paper. After embedding the secret message in LSB (least significant bit) of the cover image, the pixel values of the steg-image are modified by the genetic algorithm to keep their statistic characters. Thus, the existence of the secret message is hard to be detected by the RS analysis. Meanwhile, better visual quality can be achieved by the proposed algorithm. The experimental results demonstrate the proposed algorithm’s effectiveness in resistance to steganalysis with better visual quality. Keywords: steganography; steganalysis; genetic algorithm; RS algorithm

1. Introduction. Steganography is a branch of information hiding. It embeds the secret message in the cover media (e.g. image, audio, video, etc.) to hide the existence of the message. Steganography is often used in secrete communication. In recent years, many successful steganography methods have been proposed. Among all the methods, LSB (least significant bit) replacing method is widely used due to its simplicity and large capacity. The majority of LSB steganography algorithms embed messages in spatial domain, such as BPCS[?, ?], PVD[?, ?]. Some others, such as Jsteg[?, ?], F5[?], Outguess[?, ?], embed messages in DCT frequency domain (i.e. JPEG images). In the LSB steganography, secret message is converted into binary string. Then the least significant bit-plane is replaced by the binary string. The LSB embedding achieves good balance between the payload capacity and visual quality. However, the LSB replacing method flips one half of the least-significant bits. Thus the artifacts in the statistics of the image are easy to be detected[?]. Steganalysis is the method to reveal the hidden messages, even some doubtful media. The attacks on LSB replacing methods are most based on Chi-square analysis[?] and the relationship of pixels or bit–planes[?]. In the frequency domain, there are some steganalysis algorithms based on histogram and block effect[?]. Among the methods, the RS steganalysis[?], proposed by Fridrich, is considered as the most reliable and accurate method to the LSB–replacing steganography. It utilizes the regular and singular groups as the statistics to measure the relationship of pixels. In most nature images, strong correlation exists in adjacent pixels. After the LSB–replacing steganography, the correlation is decreased. Thus, the proportion between the regular and singular groups changes and 28

A Secure Steganography Method based on Genetic Algorithm

29

the existence of the steganography is detected. Moreover, the secrete message length can be estimated by the amount of regular and singular groups. To resist to RS analysis, the influence on the correlation of pixels needs to be compensated. The compensation may be achieved by adjusting other bit planes. Nevertheless, the implementation may be computational infeasible. For example, if only two bit planes are modified in a 256 × 256 gray level image, there are 22 possible bit selections for each pixel. For the entire image, there are 2524288 times of adjustments. It is not feasible in the practical application. For this reason, optimization algorithms have been employed in information hiding to find the optimal embedding...


References: [1] Steganography software for windows, http://members.tripod.com/steganography/stego/software.html. [2] S. C. Chu, H. C. Huang, Y. Shi, S. Y. Wu, and C. S. Shieh, Genetic watermarking for zerotree-based applications. Circuits, Systems, and Signal Processing, vol. 27, no. 2, pp. 171-182, 2008. [3] J. Fridrich, M. Goljan, and R. Du, Detecting lsb steganography in color, and gray-scale images, IEEE MultiMedia, pp. 22–28, 2001. [4] J. Fridrich, M. Goljan, and D. Hogea. Attacking the outguess, Proc. of ACM Workshop Multimedia and Security, 2002. [5] J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of jpeg images: Breaking the f5 algorithm, Proc. of ACM Workshop on Multimedia and Security 2002, 2002. [6] D. E. Goldberg, The genetic algorithms in search, optimization and machine learning, AddisonWesley, 1989. [7] C. T. Hsu, J. Wu, and L. Hidden, Digital watermarks in images, IEEE Trans. Image Processing, pp. 58-68, 1999. [8] H. C. Huang, C. M. Chu, and J. S. Pan, The optimized copyright protection system with genetic watermarking, Soft Computing, vol. 13, no. 4, pp. 333–343, 2009. [9] H. C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K. C. Huang, Progressive watermarking techniques using genetic algorithms, Circuits, Systems, and Signal Processing, vol. 26, no. 5, pp. 671–687, 2007.
A Secure Steganography Method based on Genetic Algorithm
35
[10] E. Kawaguchi and R. O. Eason, Principle and application of bpcs-steganography, Proc. of SPIE:Multimedia Systems and Applications, pp. 464–472, 1998. [11] A. R. S. Marcal and P. R. Pereira, A steganographic method for digital images robust to rs steganalysis, Lecture Notes in Computer Science, pp. 1192–1199, 2005. [12] N. Provos, Steganography detection with stegdetect, http://www.outguess.org/detection.php. [13] A. Westfeld, F5-a steganographic algorithm, Proc. of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science,2137.Springer-Verlag, pp. 289–302, 2001. [14] A. Westfeld and A. Pfitzmann, Attacks on steganographic systems, Proc. of Information HidingThird International Workshop, 1999. [15] A. Westfeld and A. Pfitzmann, Attacks on steganographic systems, Lecture Notes in Computer Science, pp. 61–76, 1999. [16] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, pp. 1613–1626, 2003. [17] X. Zhang and S. Z. Wang, Statistical analysis against spatial bpcs steganography, Computer-Aided Design & Computer Graphics, pp. 395–406, 2003. [18] X. Zhang and S. Z. Wang, Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, pp. 331–339, 2004.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Credit Card Fraud Detection using Genetic Algorithm Essay
  • Essay about Class Scheduling Using Genetic Algorithm
  • Minimization of the Transportation Cost of a Beverage Company Using Genetic Algorithm (Ga). Essay
  • Genetic Algorithm and Its Application in Layout Problems Essay
  • Essay on Sordaria Fimicola And Genetic Diversity
  • The Development of Intelligent Drum Machines Using Cartesian Genetic Programming Initial Report Essay
  • Solving N-Queens problem using Genetic Algorithms Essay
  • Robust Transmit Power Control in Cognitive Radio Using Genetic Algorithm Essay

Become a StudyMode Member

Sign Up - It's Free