Read More.

Call for Paper - January – 2025 Edition   

(SJIF Impact Factor: 5.966) (IJIFACTOR 3.8, RANKING: A+) (PIF: 3.460)

IJATCA solicits original research papers for the January – 2025 Edition.
Last date of manuscript submission is January 30, 2025.

                                                   

A Review: Genetically Modified Neural Network Used For Image Steganography


Volume: 1 Issue: 5
Year of Publication: 2015
Authors: Hafsa Zargar, Harpreet Kaur



Abstract

Steganography is the enhancement of the historical approach in which messages were transmitted by hiding its existence. Steganography emphasizes on concealing the data in some carrier medium. During communication process typical lsb steganography is not a secure way for message transmission. So a first level secure DWT based steganographic technique is proposed in integration with neural network which is further optimized with genetic algorithm using a fitness function. The second level encryption is provided to the text which uses 2 fish algorithm for generating key and elgamal algorithm for encrypting text using key generated by 2 fish. This algorithm provides more security and better image quality. The effectiveness of the proposed method can be estimated by calculating the peak signal to noise ratio (psnr) and mean square error(MSE).

References

  1. T. Morkel“Steganography and Steganalysis”, Information and Computer Security Architecture (ICSA) Research Group.

  2. EktaDagar,SunnyDagar ”, LSB Based Image Steganography Using X-Box Mapping” IEEE-2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

  3. V.Saravanan, A. Neeraja”, Security Issues in Computer Networks and Steganography” Proceedings of7\"h International Conference on Intelligent Systems and Control (ISCO 2013).

  4. Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.

  5. TandelBhavisha *, Mr.Divyesh Joshi”,Survey on different stenographic technique”http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology.

  6. AkshayPhadke, AditiMayekar.”NewSteganography Technique using Neural Network”International Journal of Computer Applications (0975 – 8887) Volume 82 – No 7, November 2013.

  7. Mrs.Archana S. Vaidya, 2Pooja N. More., 3Rita K. Fegade., 4Madhuri A.Bhavsar., 5Pooja V. Raut.,” Image Steganography using DWT and Blowfish Algorithms”IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 8, Issue 6 (Jan. - Feb. 2013), PP 15-19.

  8. Imran SarwarBajwa School of Computer Science University of Birmingham Birmingham, UK imran.sarwar@cs.bham.ac.uk,”A New Perfect Hashing based Approach for Secure Stegnograph”2011 IEEE.

  9. El-Sayed M. El-Alfy,”Detecting Pixel-Value Differencing Steganography Using Levenberg-Marquardt Neural Network” 2013 IEEE.

  10. Mohammad JavadKhosravi • Ahmad Reza Naghsh-Nilchi,”A novel joint secret image sharing and robust steganography method using wavelet”8 October 2013 Springer-Verlag Berlin Heidelberg 2013.

  11. O P Verma”Peformance Analysis Of Data Encryption Algorithms”IEEE-2011

Keywords

steganography, dwt, neural network, 2 fish, elgamal




© 2025 International Journal of Advanced Trends in Computer Applications
Foundation of Computer Applications (FCA), All right reserved.
Vision & Mission | Privacy Policy | Terms and Conditions