{"title":"基于遗传算法的图像分段隐写","authors":"M. Nosrati, A. Hanani, Ronak Karimi","doi":"10.1109/ACCT.2015.57","DOIUrl":null,"url":null,"abstract":"This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the \"before embedding hiding techniques\" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation in genetic algorithm. After finding the right places, secret message blocks are embedded and a key file is created to make the message extraction available by providing the data addresses. Experimental results with the least changes in image histogram (by the policy of setting an appropriate amount for the length of block bits) show the efficiency of current method.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"306 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Steganography in Image Segments Using Genetic Algorithm\",\"authors\":\"M. Nosrati, A. Hanani, Ronak Karimi\",\"doi\":\"10.1109/ACCT.2015.57\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the \\\"before embedding hiding techniques\\\" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation in genetic algorithm. After finding the right places, secret message blocks are embedded and a key file is created to make the message extraction available by providing the data addresses. Experimental results with the least changes in image histogram (by the policy of setting an appropriate amount for the length of block bits) show the efficiency of current method.\",\"PeriodicalId\":351783,\"journal\":{\"name\":\"2015 Fifth International Conference on Advanced Computing & Communication Technologies\",\"volume\":\"306 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-02-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Fifth International Conference on Advanced Computing & Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCT.2015.57\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2015.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Steganography in Image Segments Using Genetic Algorithm
This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the "before embedding hiding techniques" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation in genetic algorithm. After finding the right places, secret message blocks are embedded and a key file is created to make the message extraction available by providing the data addresses. Experimental results with the least changes in image histogram (by the policy of setting an appropriate amount for the length of block bits) show the efficiency of current method.