The International Journal of Science & Technoledge
The International Journal of Science & Technoledge
www.theijst.com
103
Vol 3 Issue 2
February, 2015
www.theijst.com
2. Related Work
Ghascmict al.. [8] proposed a novel steganography scheme based on integer wavelet transform and Genetic algorithm.
Ravindra Gupta et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4366 4370
Umamaheswari [9] compress the secret message and encrypt it by the receivers public key along with the stego key and embed both
messages in a carrier using an embedding algorithm.
Shyamalendu Kandar [10] proposed a technique of well known k-n secret sharing on color images using a variable length key with
share division using random number.
Anupam [11] describes how such an even-odd encryption based on ASCII value is applied and how encrypted message converting by
using Gray code and embedding with picture can secured the message and thus makes cryptanalysts job difficult.
3. Proposed System
The proposed system is basically consist of two module i.e. Steganography using genetic algorithm and visual cryptography. The
system is embedded with the framework JAVA swing.
Figure 1
LSB steganography has high embedding capacity and has low computation complexity, in which a secret binary sequence is used to
replace the least significant bits of the original medium.
First the secret data is encrypted in LSB of original image using DES encryption so as to get a stego image. Pixels location gets
modified using Genetic algorithm then we will get modified pixel stego image.
further using visual cryptography stego image is splits into various shares and the secret key is embedded in each of the shares. And
these shares are transmitted over wireless network.
Finally at receivers side shares are reassembled and reconstructed so that he will get the modified pixel stego image. And the inverse
genetic algorithm will be applied on that modified pixel stego image ,to get the original stego image.
This algorithm also provides security from external entity and keeps the confidential data secure.
And finally the secret data gets separated from that stego image using DES decryption and will get confidential data.
4. Algorithm Description
The proposed project work consist of mainly two algorithms which are
(i) Steganography using Genetic Algorithm
(ii) Visual Cryptography with Threshold.
The application initiates with Steganography module where the cover image will be encrypted to generate Stego image. The stego
image generated in this module will act as an input for visual cryptographic module.
104
Vol 3 Issue 2
February, 2015
www.theijst.com
Algorithm: Steganography
Input: Cover Image
Output: Stego Image
Step 1: Read the cover image.
Step 2: Find out the pixel values of cover image.
Step 3: Read the secret data character wise.
Step 4: Convert each character into its equivalent ASCII code.
Step 5: ASCII code is converted into binary values.
Step 6: Enter the secret key.
Step 7: Secret data is converted into cipher data.
Step 8: The stream of 8-bits (cipher data) are embedded into
LSB of each pixel of the cover image.
Step 9: To apply Genetic Algorithm in the stego image the pixel location should be modified.
Algorithm: Visual Cryptography
Input: Stego-Image
Output: Encrypted Shares
1. Read Stego-Image generated
2. The stego image is breaked into three layers namely split- 1, split-2, split-3 these three files are containing the hidden
data and to get the hidden data these three files have to be reconstructed perfectly then
3. The re-assembled picture and the extracted data will be gained again. The proposed scheme is based on standard visual
cryptography as well as visual secret sharing. The applied technique uses allocation of pseudorandom number as well as
exchange of pixels. One of the contrast part of this implementation is that while decrypting, the stego-image will be
morphologically same compared to the cover image with respect to the shape and size thereby preventing pixel
expansion effect. The implementation of the algorithm yields in better result with insignificant shares when stego images
are normally with light contrast. It can also be seen that the algorithm gives much darker shares in both gray as well as
colored output.
Set Theory Analysis
1. Let S be the Document Analysis and Recognitions Using steganography.
S= {.} Set S is divided into 6 modules
S= {S1, S2, S3, S4, S5}
S1= admin
S2= user
S3= Keyword search module (KSM)
S4= View ranking of file (VRF)
S5= View file length and execution time
2. Identify the inputs.
Inputs = {X1, X2, X3, ..Xn}
X1= Enter the file name or keywords to search
X2= Enter the image to search
3. Identify the output as O.
Outputs = {Y1, Y2, Y3, ..Yn}
Y1= file
Y2= image
5. Conclusion
In this paper we have studied the implementation of hiding the data in the image with the help of secret key using steganography and
genetic algorithm along with visual cryptography.
It has concluded that the image which contains the hidden data is fully secure using steganography and visual cryptography ,and it
also it makes difficult for external investigators to decrypt or read that hidden data.
The security features of steganography are more optimized since it uses the genetic algorithm .It can be used for color image output
making it highly compatible for real-time applications.
Our scheme has shown less variation in the pixel of images which is desirable and good for the secret image, which improves more
security and reliability.
It makes the system more efficient and simple by means of usability of keys. Further this method can applied to the 3D images as well
with some secret key in it.
6. References
1. Shyamalendu Kandar, Arnab Maiti, Variable Length Key based Visual Cryptography Scheme for Color Image using Random
Number, International Journal of Computer Applications . Volume 19 No.4, April 2011.
2. Ravindra Gupta, Akanksha Jain, Gajendra Singh, Combine use of Steganography and Visual Cryptography for Secured Data
hiding in Computer Forensics ,International Journal of Computer Science and Information Technologies, Vol. 3 (3) ,
2012,4366 4370.
105
Vol 3 Issue 2
February, 2015
106
www.theijst.com
Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSB Steganography in Colour and Grayscale Images, Proceedings of
ACM Workshop volume 02, Manuscript Code: 11011on Multimedia and Security, Ottawa, October 5, 2001, pp.27-30.
Talal Mousa Alkharobi, Aleem Khalid Alvi, New Algorithm for Halftone Image Visual Cryptography, IEEE 2004.
Mrs. G. Prema and S. Natarajan, Steganography using Genetic Algorithm along with Visual Cryptography for Wireless
Network Application, IEEE 2012.
R. Chandramouli, NasirMenon, Analysis of LSB Based Image Steganography techniques, IEEE-2001.
Arezoo Yadollahpour, Hossein Miar Naimi, Attack on LSB Steganography in Colour and Grayscale Images Using
Autocorrelation Coefficients, European Journal of Scientific Research ISSN 1450- 216X Vol.31 No.2 (2009).
Ghascmi E shanbchzadch J and ZahirAzami B, ASteganographyc method based on Integer Wavelet Transform and Genetic
Algorithm International Conference on Communications and Signal Processing (ICCSP) pp 42 45,2011.
Dr.M.Umamaheswari Prof. S.SivasubramanianS.Pandiarajan, Analysis of Different Steganographic Algorithms for Secured
Data Hiding, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010
ShyamalenduKandar, ArnabMaiti, Variable Length Key based Visual Cryptography Scheme for Color Image using Random
Number, International Journal of Computer Applications (0975 8887) Volume 19 No.4, April 2011
Anupam Kumar Bairagi, ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in
Data Security, ISSN 2078-5828 (Print), ISSN 2218-5224 (Online), Volume 01, Issue 02, Manuscript Code: 110112
TalalMousaAlkharobi, Aleem Khalid Alvi, New Algorithm For Halftone Image Visual Cryptography, IEEE 2004
AderemiOluyinki, Some improved genetic algorithms based on Heuristics for Global Optimization with innovative
Applications, Doctorial thesis, 2010
Vol 3 Issue 2
February, 2015
Reproduced with permission of the copyright owner. Further reproduction prohibited without
permission.