106
Views
5
CrossRef citations to date
0
Altmetric
Research Articles

Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve

ORCID Icon &
Pages 148-158 | Received 06 Oct 2017, Accepted 11 Jan 2019, Published online: 01 Feb 2019
 

ABSTRACT

This paper presents the security analysis of a recently proposed data hiding scheme by Kanan and Nazeri [A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014;41(14):6123–6130]. Security of the scheme depends upon a secret key\chromosome constructed using a genetic algorithm. The key specifies offsets and patterns for data embedding. By performing the key-sensitivity analysis and exploiting image pixel correlation, it is shown in the present paper that the secret data can be easily revealed. Simulation results demonstrate that just 11 bits out of the 27-bit secret key are sufficient to reveal the data. To overcome the problem, an improvement is suggested in the data embedding pattern that demonstrates high data security. Bitwise analysis of the secret key used in the modified approach exhibits high sensitivity to change in the key.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes on contributors

Gyan Singh Yadav was born in Mavai Khurd (Mahoba), Uttar Pradesh, India. He received the B.Tech. degree in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow, Uttar Pradesh, India, the M.Tech. and Ph.D. degrees in Computer Science and Engineering from PDPM Indian Institute of Information Technology Design and Manufacturing, Jabalpur, Madhya Pradesh, India. He is currently working as an assistant professor in Computer Science and Engineering at Jaypee Institute of Information Technology Noida, Uttar Pradesh, India.

Aparajita Ojha is a professor at PDPM Indian Institute of Information Technology, Design and Manufacturing Jabalpur, India. She obtained her Ph.D. in Mathematics from R.D. University, Jabalpur in 1987. Her research interests include Computer-Aided Design, Robot Motion Planning and Visual Cryptography.

Image note

Images in figures 3 & 5 were taken from publicly available sets of test images available in the following links:

https://homepages.cae.wisc.edu/~ece533/images/

https://www.hlevkin.com/06testimages.htm

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.