International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 13 | Number 1 | Year 2014 | Article Id. IJETT-V13P206 | DOI : https://doi.org/10.14445/22315381/IJETT-V13P206

Genetic Algorithm in Audio Steganography


Manisha Rana , Rohit Tanwar

Citation :

Manisha Rana , Rohit Tanwar, "Genetic Algorithm in Audio Steganography," International Journal of Engineering Trends and Technology (IJETT), vol. 13, no. 1, pp. 29-34, 2014. Crossref, https://doi.org/10.14445/22315381/IJETT-V13P206

Abstract

With the advancement of communication technology, data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an emerging component of AI to provide suboptimal solutions. In this paper the use of GA in Steganography is explored to find future scope of research.


Keywords

HAS, Secret Data , Genetic Algorithm, Mutation, Chromosome

References

[1] Muhalim Mohamed Amin, Subariah Ibrahim, Mazleena Salleh, Mohd Rozi Katmin “INFORMATION HIDING USING STEGANOGRAPHY” Department of Computer System & Communication Faculty of Computer Science and Information system, UNIVERSITI TEKNOLOGI MALAYSIA, 2003, url: http://eprints.utm.my/4339/1/71847.pdf
[2] Samir Kumar Bandyopadhyay*1, Tuhin Utsab Paul2 and Avishek Raychoudhury3,” Genetic Algorithm Based Substitution Technique Of Imagesteganography”, Journal of Global Research in Computer Science ISSN-2229-371X , Volume 1, No. 5, December 2010
[3] Lifang Yu • Yao Zhao • Rongrong Ni • Zhenfeng Zhu, “PM1 steganography in JPEG images using genetic algorithm” Soft Comput (2009) 13:393–400 DOI 10.1007/s00500-008-0327-7 Published online: 3 June 2008
[4] Mazdak Zamani1, Azizah A. Manaf2, Rabiah B. Ahmad3, Akram M. Zeki4, and Shahidan Abdullah5, “A Genetic-Algorithm-Based Approach for Audio Steganography”, World Academy of Science, Engineering and Technology 54 2009
[5] Christine K. Mulunda,Peter W. Wagacha, Alfayo O. Adede,”Genetic Algorithm Based Model in Text Steganography”, African Journal of Information Systems ISSN:1936-0282, Vol.-5 Issue-4,Oct.-2013
[6] R.J. Anderson, F.A.P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected Area in Communications, pp. 474-481, May 1998.
[7] M. Ramkumar & A.N. Akansu. “Some Design Issues For Robust Data hiding Systems”, url:http://citeseer.nj.nec.com/404009.html>
[8] N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998.
[9] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, pp. 26-34, 1998


Time: 0.0014 sec Memory: 32 KB
Current: 1.87 MB
Peak: 4 MB