a) M.Tech Scholar, Jamia Hamdard(Hamdard University), Hamdard Nager, N.D-110062
b) F/O Engg, University Polytechnic, JMI, New Delhi-110025
Email: email@example.com, firstname.lastname@example.org, email@example.com
Running Head: A Genetic algorithm based crypt-steganography technique for message hiding in JPEG images
*To whom correspondence should be addressed
M.Tech Scholar, Jamia Hamdard(Hamdard University), Hamdard Nager, N.D-110062 Abstract
Genetic algorithm based method of message hiding employs the features of both Cryptography and Steganography to provide high level protection of secret information .The developed system generates the CRC of the message to be hidden, compresses it to achieve faster speed of transmission and asks for a JPEG image which acts as a carrier of the message. The compressed message is then embedded into JPEG image by P01 algorithm using a secret key at the sending end, hence generating a crypt-stego JPEG image. At the receiving end, the compressed message is extracted from crypt-stego using the same secret key which was used for embedding. The use of cryptography along with genetic algorithm makes the proposed “Crypt-Stegnography” technique more secure and maintains privacy and secrecy of the message. Genetic algorithm maintains appropriate peak signal to noise ratio of JPEG images which results in lesser probability of detection of secret message. The use of P01 technique ensures high embedding capacity. The experiments carried out through the developed system proves higher embedding capacity and maintains secrecy of data.
Crypt-Steganography ,Compression -Decompression, CRC Generation and verification,P01,GA.
As an important component of multimedia information security information hiding has received wide
References: J. Fridrich, M. Goljan, and D. Hogea, “Attacking the OutGuess”, Proceedings of the ACM Workshop on Multimedia and Security, pp.1-13, 2002 . J.Fridrich, M. Goljan and D. Hogea,“Steganalysis of JPEG images: breaking the F5 algorithm”, Lecture notes in computer science, pp.310-232, 2003. J JozsefLenti,“StegnographicMethods”,PeriodicaPolytechnica4, pp.249–258, 2000.  Kristy Westphal “Stegnography Revealed”, Security focus,pp.2-28, 2003-04-0  K  M.Madavi, S.Samavi, V.Sabeti, “Transform domain steganography using random blocking for uncompressed images”, 4th Iranian Society of Cryptology Conference, pp.292-295, 2007.  M  NeilF.Johnson, “Stegnography” Technical report IEEE Computer, pp.26-34, 1995.  N.Provos, “Defending against statistical steganalysis”, 10th USENIX Security Symposium, pp.323-335, 2001  R.J. Anderson and F.A.P.Petitcolas, “On the Limits of Steganography”, Selected Areas in Comm., pp.474–481, 1998. F.A.P B. Chen and G.W. Wornell, “Quantization Index Modulation” IEEE Trans. Information Theory, Methods for Digital Watermarking and Information Embedding, pp.1423–1443, 2001. N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen", Computer portal, pp. 26–34, 1998.  J. Sciences Militaires (J. Military Science, in French), A. Kerckhoffs, “La Cryptographie Militaire (Military Cryptography)", pp.161-191, 1883. Huynh-Thu, Q.Ghanbari, "Scope of validity of PSNR in image/video quality assessment", Electronics Letters pp.800–801, 2008.  J  G J Simmons,“Prisoners Problem and the Subliminal Channel”, Proc Int Conf Advances in Cryptology, pp.51–67, 1984.  A D Ker ,“Steganalysis of LSB Matching in Grayscale Images”, IEEE Signal Processing Letters, 2005  Shao-Hui Liu , Tian-Hang Chen , Hong-Xun Yao Wen Ga ,“A variable depth LSB data hiding technique in images”, The third international conference on Machine Learning and Cybernetics, pp. 3990 – 3994, 2004.  “Chi-Kwong Chang, L M Chen, "Improved hiding data in images by optimal moderately significant-bit replacement”, Electronics Letters, pp.1017 –1018, 2001.