{"title":"Steganography in Image Segments Using Genetic Algorithm","authors":"M. Nosrati, A. Hanani, Ronak Karimi","doi":"10.1109/ACCT.2015.57","DOIUrl":null,"url":null,"abstract":"This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the \"before embedding hiding techniques\" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation in genetic algorithm. After finding the right places, secret message blocks are embedded and a key file is created to make the message extraction available by providing the data addresses. Experimental results with the least changes in image histogram (by the policy of setting an appropriate amount for the length of block bits) show the efficiency of current method.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"306 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2015.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36
Abstract
This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the "before embedding hiding techniques" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation in genetic algorithm. After finding the right places, secret message blocks are embedded and a key file is created to make the message extraction available by providing the data addresses. Experimental results with the least changes in image histogram (by the policy of setting an appropriate amount for the length of block bits) show the efficiency of current method.