106
Views
5
CrossRef citations to date
0
Altmetric
Research Articles

Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve

ORCID Icon &
Pages 148-158 | Received 06 Oct 2017, Accepted 11 Jan 2019, Published online: 01 Feb 2019

References

  • Naor M, Shamir A. Visual cryptography. In: Advances in Cryptology-EUROCRYPT'94. Springer; 1995. p. 1–12.
  • Lin CC, Tsai WH. Secret image sharing with steganography and authentication. J Syst Softw. 2004;73(3):405–414. doi: 10.1016/S0164-1212(03)00239-5
  • Yang CN, Chen TS, Yu KH, et al. Improvements of image sharing with steganography and authentication. J Syst Softw. 2007;80(7):1070–1076. doi: 10.1016/j.jss.2006.11.022
  • Wu CC, Kao SJ, Hwang MS. A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw. 2011;84(12):2196–2207. doi: 10.1016/j.jss.2011.06.021
  • Kanan HR, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014;41(14):6123–6130. doi: 10.1016/j.eswa.2014.04.022
  • Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol. 2006;16(10):1301–1308. doi: 10.1109/TCSVT.2006.882380
  • Luo XY, Wang DS, Wang P, et al. A review on blind detection for image steganography. Signal Process. 2008;88(9):2138–2157. doi: 10.1016/j.sigpro.2008.03.016
  • Wang S, Yang B, Niu X. A secure steganography method based on genetic algorithm. J Inf Hiding Multimedia Signal Process. 2010;1(1):28–35.
  • Yang CH, Weng CY, Wang SJ, et al. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensic Secur. 2008;3(3):488–497. doi: 10.1109/TIFS.2008.926097
  • Wang Z, Bovik AC, Sheikh HR, et al. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–612. doi: 10.1109/TIP.2003.819861
  • Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004;37(3):469–474. doi: 10.1016/j.patcog.2003.08.007
  • Ioannidou A, Halkidis ST, Stephanides G. A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl. 2012;39(14):11517–11524. doi: 10.1016/j.eswa.2012.02.106
  • Alvarez G, Amigó JM, Arroyo D, et al. Lessons learnt from the cryptanalysis of chaos-based ciphers. In: Chaos-based cryptography. Springer; 2011. p. 257–295.
  • Duric Z, Jacobs M, Jajodia S. Information hiding: steganography and steganalysis. Handbook Statist. 2005;24:171–187. doi: 10.1016/S0169-7161(04)24006-8
  • Li C, Li S, Alvarez G, et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A. 2007;369(1-2):23–30. doi: 10.1016/j.physleta.2007.04.023
  • Wu DC, Tsai WH. A steganographic method for images by pixel-value differencing. Pattern Recognit Lett. 2003;24(9-10):1613–1626. doi: 10.1016/S0167-8655(02)00402-6
  • Arroyo D, Alvarez G, Li S, et al. Cryptanalysis of a new chaotic cryptosystem based on ergodicity. Int J Modern Phys B. 2009;23(05):651–659. doi: 10.1142/S0217979209049966
  • Hermassi H, Rhouma R, Belghith S. Security analysis of image cryptosystems only or partially based on a chaotic permutation. J Syst Softw. 2012;85(9):2133–2144. doi: 10.1016/j.jss.2012.04.031
  • Chang CC, Hsieh YP, Lin CH. Sharing secrets in stego images with authentication. Pattern Recognit. 2008;41(10):3130–3137. doi: 10.1016/j.patcog.2008.04.006
  • Doğan Ş. A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev. 2016;46(1):129–143. doi: 10.1007/s10462-016-9459-9
  • Muhammad K, Sajjad M, Mehmood I, et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools Appl. 2016;75(22):14867–14893. doi: 10.1007/s11042-015-2671-9
  • Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia. 2001;8(4):22–28. doi: 10.1109/93.959097
  • Janakiraman S, Thenmozhi K, Rajagopalan S, et al. Space filling curve for data filling: an embedded security approach. J Inf Technol. 2014;6:188–197.
  • INFORMATICS I. PROGRAM GUIDE; 2013.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.