A Steganography Technique Based on the Huffman Codes and PM1 Technique

Main Article Content

Sonal Dwivedi
Mohammad Tabrez Nafis

Abstract

In this age of technology, everyday huge amount of data is transferred across the network. The higher the amount of data transmission the larger the amount of security is needed. In this scenario security of the data stands as the basic need and it needs to be addressed and solved first. In this paper combination of a standard table and Plus minus 1 (PM1) steganography using Genetic Algorithm (GA) is proposed which would not only allow transmission of a large amount of data but would also eliminate the need of embedding the look-up table along with the image.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Sonal Dwivedi, Jamia Hamdard

Student Department of Computer Science and Engineering

Mohammad Tabrez Nafis, Jamia Hamdard

Assistant Professor Department of Computer Science and Engineering

References

Holotyak, T., Fridrich, J. and Soukal, D., 2005, March. Stochastic approach to secret message length estimation in±k embedding steganography. In Electronic Imaging 2005 (pp. 673-684). International Society for Optics and Photonics.

Mielikainen, J., 2006. LSB matching revisited. IEEE signal processing letters, 13(5), pp.285-287.

Zhang, L., Wang, H. and Wu, R., 2009. A high-capacity steganography scheme for JPEG2000 baseline system. IEEE Transactions on Image Processing, 18(8), pp.1797-1803.

Yu, L., Zhao, Y., Ni, R. and Zhu, Z., 2009. PM1 steganography in JPEG images using genetic algorithm. Soft Computing, 13(4), pp.393-400.

Chan, C.K. and Cheng, L.M., 2004. Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), pp.469-474.

Wang, R.Z., Lin, C.F. and Lin, J.C., 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern recognition, 34(3), pp.671-683.

Wang, R.Z., Lin, C.F. and Lin, J.C., 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern recognition, 34(3), pp.671-683.

Wang, S., Yang, B. and Niu, X., 2010. A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), pp.28-35.

Tiwari, P., Madaan, N. and Nafis, M.T., 2015. Cryptographic Technique: Base Change Method. International Journal of Computer Applications, 118(14).

Tiwari, P. and Nafis, M.T., 2015. Error Patterns and Analysis of Hindi Shallow Parser. International Journal of Computer Applications, 110(14).

Dwivedi, S. (2016). An optimized steganographic technique. CSI Transactions on ICT, 1-9. doi: 10.1007/s40012-016-0116-x