Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network

نویسندگان

  • Chao-Shen Chen
  • Rong-Jian Chen
  • Sozan Abdulla
  • Divya James
  • Mintu Philip
  • Kulvinder Kaur
  • Vineeta Khemchandani
چکیده

Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of data hiding and transmission over network, this paper proposed system which uses genetic algorithm along with Visual Cryptography. Plain text is converted into cipher text by using any cipher then it is hidden in LSB of image. Genetic Algorithm is used to shuffle pixel location of image so that detection of secret information become complex. Pixel locations are shuffled using Scan code algorithm. Visual cryptography is kind of encryption technique which divide secret image into multiple shares to ensure improved security and reliability.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

Optimization of Energy Consumption in Image Transmission in Wireless Sensor Networks (WSNs) using a Hybrid Method

In wireless sensor networks (WSNs)‎, ‎sensor nodes have limited resources with regard to computation‎, ‎storage‎, ‎communication bandwidth‎, ‎and the most important of all‎, ‎energy supply‎. ‎In addition‎, ‎in many applications of sensor networks‎, ‎we need to send images to a sink node‎. ‎Therefore‎, ‎we have to use methods for sending images in which the number and volume of packets are optim...

متن کامل

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

LSB Based Steganography using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission

A large number of commercial steganographic programs use the Least Significant Bit(LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity. Although there has been an extensive research work in the past, but majority of the work has no much optimal consideration for robust security towards the encrypted image. The proposed system p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015