Open Access Open Access  Restricted Access Subscription or Fee Access

Data Embedding Technique for Palette Scale Image using Derived Genetic Algorithm (DEP-DGA)

P.M. Siva Raja, E. Baburaj

Abstract


Steganography method is used for exchanging the hidden information. It is defined as the study of hidden communication that deals with the existence of communicated messages. The existing methodology for minimizing additive distortion in steganography fails in measuring the level of distortion for the given source palette digital image. Perfect sphere shaped palette digital images are not suitable for selection, as cover models because the hidden data might be easily observed even after specific modification by embedding method. To shape constraints in palette digital images and to observe the distortion, data embedding technique using derived genetic algorithm for palette scale image has been proposed. Row major order is used to embed huge quantity of stego message on source palette digital image. Four bits of data hiding message is embedded per byte of the source palette digital image onto the rightmost 4 bit of each pixel. Mutation is applied on the embedded palette digital image. In the process of embedding, dimension of the data hiding message is followed by the content of the original palette based digital image. Reverse procedure is followed during decoding. Derived Genetic algorithm is used to enhance the security level without any extraction of data by attackers. Several statistical parameters computed are compared with the existing additive distortion syndrome trellis code method using Statlog Dataset from UCI repository. DEP-DGA approach obtained better results in terms of security level of hidden information, 3.50 % improved throughput on using the palette based digital image for embedding and minimize the RMS error between the stego message and the palette based original image.

Keywords


Data embedding technique, derived genetic algorithm, root mean square (RMS), data hiding, palette based original image, security, stego message

Full Text:

PDF

References


Tomas Filler, Jan Judas, Jessica Fridrich. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. IEEE Transactions on Information Forensics and Security. 2011; 6(3).

RigDas, Themrichon Tuithung. A Novel Steganography Method for Image Based on Huffman Encoding. IEEE Transaction On Computer Graphics. 2012.

Abbas Cheddad. et al. Digital image steganography: Survey and analysis of current methods. Elsevier Journal, Signal Processing. 2010.

Remi Cogranne, Florent Retraint. An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection IEEE Transaction on An Asymptotically Uniformly Most Powerful Test For Lsb Matching Detection. 2013.

Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image SteganographyBased on LSB Matching Revisited. IEEE Transactions On Information Forensics And Security. 2010; 5(2).

Tu-Thach Quach. Optimal Cover Estimation Methods and Steganographic Payload Location. IEEE Transactions on Information Forensics and Security. 2011; 6(4).

Tomas Pevny, Patrick Bas, Jessica Fridrich. Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics and Security. 2010; 5(2).

Amin Milani Fard. et al. A New Genetic Algorithm Approach for Secure JPEG Steganography. IEEE Conference on Computer Graphics. 2007.

Chiang-Lung Liu, Shiang-Rong Liao. High-performance JPEG steganography using complementary embedding strategy. Elsevier Journal, Science Direct. 2008.

Pew-Thian Yap, Xudong Jiang, Alex Chichung Kot. Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2010; 32(7).

Min-Wen Chao. et al. A High Capacity 3D Steganography Algorithm. IEEE Transactions on Visualization And Computer Graphics. 2009; 15(2).

Amit Pande, Joseph Zambreno. The secure wavelet transform. Springer Journal. 2010.

Chung-Li Hou et al. An Optimal Data Hiding Scheme With Tree-Based Parity Check. IEEE Transactions on Image Processing. 2011; 20(3).


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/