SlideShare a Scribd company logo
By,
Aparna.N.K
S4 MCA
ROLL NO:1
Introduction
Keywords
Brief Overview
Proposed System
Step by Step Process
Algorithm Description
Functional Flow Diagram
Performance Analysis
Result
The main aim of the project is to design a feasible RS
resistance secure algorithm which combines the use
of both steganography and cryptography with the
goals of improving security, reliability, and efficiency
for secret message. LSB steganography is combined
with the Genetic Algorithm making it more secure
from RS steganalysis.
Steganalysis:
The detection of steganographically encoded
packages is called Steganalysis. To make
steganalysis easier, several softwares are readily
available on the internet as freeware or as a
shareware. These softwares are capable of
determining the irregularity of RGB patterns in the
image, thus alerting the user that the particular image
is a stego image.
Cryptography
Cryptography is the practice and study of
techniques for secure communication in the presence
of third parties (called adversaries).
Visual Cryptography
Visual cryptography is a
cryptographic technique which
allows visual information to be
encrypted in such a way that
decryption becomes a mechanical
operation that does not require a
computer.
Genetic Algorithm
In the computer science field of artificial
intelligence, a genetic algorithm (GA) is a search
heuristic that mimics the process of natural selection.
This heuristic (also sometimes called a metaheuristic)
is routinely used to generate useful solutions to
optimization and search problems.
Hiding information by embedding secret data into an
innocuous medium is often referred to as steganography.
Steganography can be applied electronically by taking a
message (a binary file) and some sort of cover (often a sound
or image file) and combining both to obtain a “stego-object”.
The RS analysis is considered as one of the most famous
steganalysis algorithm which has the potential to detect the
hidden message by the statistic analysis of pixel values
Both the topic of steganography and visual
cryptography has been considered as a distinct topic
for image security.
The use of steganography in combination visual
cryptography is a sturdy model and adds a lot of
challenges to identifying such hidden and encrypted
data
steganography using genetic algorithm along with visual cryptography for wireless network application
The proposed makes use of the LSB steganography
combined with Genetic Algorithm. The Genetic
algorithm is used to modify the pixel locations of the
stego image thus enhancing the security level to new
heights. The hidden data is now distributed all over
the image rather than at the LSB of the stego image.
An input image is accepted as cover image which is used
to hide the secret message.
An input image is accepted as cover image for the input
message in plain text format.
After embedding the secret message in LSB (least
significant bit) of the cover image, the pixel values of the
steg-image are modified by the genetic algorithm to keep
their statistic characters.
The user can select their targeted information in terms of
plain text for embedding the secret message in LSB of
the cover image.
The implications of the visual cryptography will enable
the pixels value of the steg-image to keep their statistic
character.
LSB steganography has low computation complexity and
high embedding capacity, in which a secret binary
sequence is used to replace the least significant bits of the
host medium.
The algorithm in use is not secret but only the key used
by the algorithm is kept as a secret between the two
parties, this assumption is also known as Kerchoff’s
principle in the field of cryptography.
steganography using genetic algorithm along with visual cryptography for wireless network application
The proposed project work consist of mainly two
algorithms which are
(i) Steganography using Genetic Algorithm
(ii) Visual Cryptography with Threshold.
The application initiates with Steganography
module where the cover image will be encrypted to
generate Stego image. The stegographic image
generated in this module will act as an input for
visual cryptographic module.
Algorithm: Steganography
Input: Cover Image
Output: Stego Image
Step 1: Read the cover image.
Step 2: Find out the pixel values of cover image.
Step 3: Read the secret data character wise.
Step 4: Convert each character into its equivalent ASCII code.
Step 5: ASCII code is converted into binary values.
Step 6: Enter the secret key.
Step 7: Secret data is converted into cipher data.
Step 8: The stream of 8-bits (cipher data) are embedded into
LSB of each pixel of the cover image.
Step 9: To apply Genetic Algorithm in the stego image the
pixel location should be modified.
Algorithm: Visual Cryptography
Input: Stego-Image
Output: Encrypted Shares
Step 1: Read Stego-Image generated.
Step 2: The stego image is breaked into three layers namely
split-1, split-2, split-3 these three files are containing
the hidden data and to get the hidden data these
three files have to be reconstructed perfectly.
Step 3: The re-assembled picture and the extracted data
will be gained again.
steganography using genetic algorithm along with visual cryptography for wireless network application
The proposed system works in the following phases:
SENDER SIDE:
Encryption Phase: The data to be encrypted is first read
from the user through the keyboard using an appropriate GUI,
designed in JAVA. The encryption algorithm used in the DES.
Encoding Phase:
The encrypted image is then encoded into the
least significant bits of the image.
Pixel Modification Phase:
Genetic algorithm is used to modify the pixel
locations for enhancing security and reliability.
RECEIVERS SIDE:
Overlapping Phase:
The two shares of the same image are needed to retrieve
the original information As the cipher data is distributed in
both the images, it is impossible for anyone to get the data by
obtaining just a single share of the image.
Decoding Phase :In the decoding phase, the cipher
data is decoded from the stego image. The cipher
data can be retrieved by the inverse process of
encoding process that was employed at the sender
side.
Decryption Phase :In the decryption phase, the
cipher data is converted into the original data. The
DES algorithm is used in the inverse manner using
the same encryption key(secret key) as used during
encryption of the original data.
The performance of the proposed system is experimented by
performing stegnalysis and conducting benchmarking test for
analysing parameters like Mean Squared Error (MSE) and Peak Signal
to Noise Ratio.
Cover image : rice.png
Size : 256*256
Mean Square Error (MSE) : 0.0678
Peak Signal-to-Noise Ratio (PSNR) : 59.8188db
After applying Genetic Algorithm the measured performance is
shown in below
Mean Square Error (MSE) : 0.794
Peak Signal-to-Noise Ratio (PSNR) : 39.4011db
After applying genetic algorithm all the pixel location are altered.
Due to the change the pixel location MSE and PSNR values are
increased.
Encrypt Screen Message to be encrypted: “Sachin RameshTendulkar-The LEGEND”
Encode Screen
After clicking on Encrypt Now at the bottom, the encrypted message is shown. Cipher
Text : vbPG8nqjKQoW6N6ugkb4l+wbTz3c+EyRLPkW5nxVv1ZKFxHyPyTQoQ==
After clicking on Encode Now, a File Chooser is opened to choose the image file.
steganography using genetic algorithm along with visual cryptography for wireless network application
steganography using genetic algorithm along with visual cryptography for wireless network application
The proposed system has discussed
implementation of securely using steganography
using genetic algorithm along with visual
cryptography. It can be concluded that when normal
image security using steganographic and visual
cryptographic technique is applied, it makes the task
of the investigators unfeasible to decrypt the encoded
secret message. The security features of the
steganographic are highly optimized using genetic
algorithm.
steganography using genetic algorithm along with visual cryptography for wireless network application

More Related Content

PPT
Visual Cryptography
PPT
Information security
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Difference between Active attack and Passive attack
PPTX
MD5 ALGORITHM.pptx
PPTX
Lecture 10 intruders
PPTX
Cryptography
PPTX
Symmetric and Asymmetric Encryption
Visual Cryptography
Information security
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Difference between Active attack and Passive attack
MD5 ALGORITHM.pptx
Lecture 10 intruders
Cryptography
Symmetric and Asymmetric Encryption

What's hot (20)

PPTX
Public Key Cryptosystem
PPT
Network security cryptographic hash function
PDF
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
PPTX
Cloud Computing
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Elliptic Curve Cryptography
PPTX
unit 3 Design 1
PPTX
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
PPT
Steganography
PPT
Traditional symmetric-key cipher
PPTX
Hash Function
PPTX
Community detection algorithms
PPTX
Cryptographic algorithms
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
Asymmetric Cryptography
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Hash function
PPTX
Substitution techniques
PPTX
Application security models
PDF
DIGITAL IMAGE PROCESSING - Visual perception - DAY 2
Public Key Cryptosystem
Network security cryptographic hash function
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Cloud Computing
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Elliptic Curve Cryptography
unit 3 Design 1
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Steganography
Traditional symmetric-key cipher
Hash Function
Community detection algorithms
Cryptographic algorithms
Cryptography and Network Security William Stallings Lawrie Brown
Asymmetric Cryptography
Cryptography - Block cipher & stream cipher
Hash function
Substitution techniques
Application security models
DIGITAL IMAGE PROCESSING - Visual perception - DAY 2
Ad

Viewers also liked (20)

PPTX
Visual Cryptography
PPTX
Visual Cryptography
PPTX
Online paymentusingsteganographt&Visualcryptography
PDF
Steganography using visual cryptography
DOCX
Visual Cryptography Industrial Training Report
PPTX
online payment system using Steganography and Visual cryptography
PPTX
Visual cryptography
DOCX
Steganography using visual cryptography: Report
PDF
steganography using visual cryptography_report
PPTX
Visual CryptoGraphy
PPTX
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
PPTX
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
PPTX
Steganography with RSA Algorithm
PDF
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
PDF
Automata Invasion
PPT
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
PPS
Visual Cryptography in Meaningful Shares
PDF
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
PPT
Secure payment systems
PPTX
Research Methodology-03: Plagiarism
Visual Cryptography
Visual Cryptography
Online paymentusingsteganographt&Visualcryptography
Steganography using visual cryptography
Visual Cryptography Industrial Training Report
online payment system using Steganography and Visual cryptography
Visual cryptography
Steganography using visual cryptography: Report
steganography using visual cryptography_report
Visual CryptoGraphy
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
Steganography with RSA Algorithm
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
Automata Invasion
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Visual Cryptography in Meaningful Shares
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
Secure payment systems
Research Methodology-03: Plagiarism
Ad

Similar to steganography using genetic algorithm along with visual cryptography for wireless network application (20)

PDF
Cecimg an ste cryptographic approach for data security in image
PDF
Transmission of cryptic text using rotational visual
PDF
Transmission of cryptic text using rotational visual cryptography
PDF
11.data security using cryptosteganography in web application
PDF
L045056469
PDF
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
PDF
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
PPTX
Cryptography and steganography
PDF
Image Steganography With Encryption
PDF
Image Steganography With Encryption
PDF
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
PPTX
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
PDF
Encrypting and Decrypting Message via Image Slicing
PPTX
STEGANO FIN RVW with the most efforts to make the final report look good
PDF
RC4 Technique in Visual Cryptography
PDF
IRJET- Concealing of Deets using Steganography Technique
PDF
IRJET- Concealing of Deets using Steganography Technique
PDF
Ijetcas14 355
PDF
AJMS_491_23.pdf
PDF
ANURADHA_FINAL_REPORT
Cecimg an ste cryptographic approach for data security in image
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual cryptography
11.data security using cryptosteganography in web application
L045056469
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
Cryptography and steganography
Image Steganography With Encryption
Image Steganography With Encryption
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Encrypting and Decrypting Message via Image Slicing
STEGANO FIN RVW with the most efforts to make the final report look good
RC4 Technique in Visual Cryptography
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
Ijetcas14 355
AJMS_491_23.pdf
ANURADHA_FINAL_REPORT

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
master seminar digital applications in india
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Pharma ospi slides which help in ospi learning
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Classroom Observation Tools for Teachers
Institutional Correction lecture only . . .
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
master seminar digital applications in india
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pharma ospi slides which help in ospi learning
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Anesthesia in Laparoscopic Surgery in India
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pre independence Education in Inndia.pdf
Basic Mud Logging Guide for educational purpose
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPH.pptx obstetrics and gynecology in nursing
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Classroom Observation Tools for Teachers

steganography using genetic algorithm along with visual cryptography for wireless network application

  • 2. Introduction Keywords Brief Overview Proposed System Step by Step Process Algorithm Description Functional Flow Diagram Performance Analysis Result
  • 3. The main aim of the project is to design a feasible RS resistance secure algorithm which combines the use of both steganography and cryptography with the goals of improving security, reliability, and efficiency for secret message. LSB steganography is combined with the Genetic Algorithm making it more secure from RS steganalysis.
  • 4. Steganalysis: The detection of steganographically encoded packages is called Steganalysis. To make steganalysis easier, several softwares are readily available on the internet as freeware or as a shareware. These softwares are capable of determining the irregularity of RGB patterns in the image, thus alerting the user that the particular image is a stego image.
  • 5. Cryptography Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).
  • 6. Visual Cryptography Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer.
  • 7. Genetic Algorithm In the computer science field of artificial intelligence, a genetic algorithm (GA) is a search heuristic that mimics the process of natural selection. This heuristic (also sometimes called a metaheuristic) is routinely used to generate useful solutions to optimization and search problems.
  • 8. Hiding information by embedding secret data into an innocuous medium is often referred to as steganography. Steganography can be applied electronically by taking a message (a binary file) and some sort of cover (often a sound or image file) and combining both to obtain a “stego-object”. The RS analysis is considered as one of the most famous steganalysis algorithm which has the potential to detect the hidden message by the statistic analysis of pixel values
  • 9. Both the topic of steganography and visual cryptography has been considered as a distinct topic for image security. The use of steganography in combination visual cryptography is a sturdy model and adds a lot of challenges to identifying such hidden and encrypted data
  • 11. The proposed makes use of the LSB steganography combined with Genetic Algorithm. The Genetic algorithm is used to modify the pixel locations of the stego image thus enhancing the security level to new heights. The hidden data is now distributed all over the image rather than at the LSB of the stego image.
  • 12. An input image is accepted as cover image which is used to hide the secret message. An input image is accepted as cover image for the input message in plain text format. After embedding the secret message in LSB (least significant bit) of the cover image, the pixel values of the steg-image are modified by the genetic algorithm to keep their statistic characters. The user can select their targeted information in terms of plain text for embedding the secret message in LSB of the cover image.
  • 13. The implications of the visual cryptography will enable the pixels value of the steg-image to keep their statistic character. LSB steganography has low computation complexity and high embedding capacity, in which a secret binary sequence is used to replace the least significant bits of the host medium. The algorithm in use is not secret but only the key used by the algorithm is kept as a secret between the two parties, this assumption is also known as Kerchoff’s principle in the field of cryptography.
  • 15. The proposed project work consist of mainly two algorithms which are (i) Steganography using Genetic Algorithm (ii) Visual Cryptography with Threshold. The application initiates with Steganography module where the cover image will be encrypted to generate Stego image. The stegographic image generated in this module will act as an input for visual cryptographic module.
  • 16. Algorithm: Steganography Input: Cover Image Output: Stego Image Step 1: Read the cover image. Step 2: Find out the pixel values of cover image. Step 3: Read the secret data character wise. Step 4: Convert each character into its equivalent ASCII code. Step 5: ASCII code is converted into binary values. Step 6: Enter the secret key. Step 7: Secret data is converted into cipher data. Step 8: The stream of 8-bits (cipher data) are embedded into LSB of each pixel of the cover image. Step 9: To apply Genetic Algorithm in the stego image the pixel location should be modified.
  • 17. Algorithm: Visual Cryptography Input: Stego-Image Output: Encrypted Shares Step 1: Read Stego-Image generated. Step 2: The stego image is breaked into three layers namely split-1, split-2, split-3 these three files are containing the hidden data and to get the hidden data these three files have to be reconstructed perfectly. Step 3: The re-assembled picture and the extracted data will be gained again.
  • 19. The proposed system works in the following phases: SENDER SIDE: Encryption Phase: The data to be encrypted is first read from the user through the keyboard using an appropriate GUI, designed in JAVA. The encryption algorithm used in the DES.
  • 20. Encoding Phase: The encrypted image is then encoded into the least significant bits of the image.
  • 21. Pixel Modification Phase: Genetic algorithm is used to modify the pixel locations for enhancing security and reliability.
  • 22. RECEIVERS SIDE: Overlapping Phase: The two shares of the same image are needed to retrieve the original information As the cipher data is distributed in both the images, it is impossible for anyone to get the data by obtaining just a single share of the image.
  • 23. Decoding Phase :In the decoding phase, the cipher data is decoded from the stego image. The cipher data can be retrieved by the inverse process of encoding process that was employed at the sender side.
  • 24. Decryption Phase :In the decryption phase, the cipher data is converted into the original data. The DES algorithm is used in the inverse manner using the same encryption key(secret key) as used during encryption of the original data.
  • 25. The performance of the proposed system is experimented by performing stegnalysis and conducting benchmarking test for analysing parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio. Cover image : rice.png Size : 256*256 Mean Square Error (MSE) : 0.0678 Peak Signal-to-Noise Ratio (PSNR) : 59.8188db After applying Genetic Algorithm the measured performance is shown in below Mean Square Error (MSE) : 0.794 Peak Signal-to-Noise Ratio (PSNR) : 39.4011db After applying genetic algorithm all the pixel location are altered. Due to the change the pixel location MSE and PSNR values are increased.
  • 26. Encrypt Screen Message to be encrypted: “Sachin RameshTendulkar-The LEGEND”
  • 27. Encode Screen After clicking on Encrypt Now at the bottom, the encrypted message is shown. Cipher Text : vbPG8nqjKQoW6N6ugkb4l+wbTz3c+EyRLPkW5nxVv1ZKFxHyPyTQoQ==
  • 28. After clicking on Encode Now, a File Chooser is opened to choose the image file.
  • 31. The proposed system has discussed implementation of securely using steganography using genetic algorithm along with visual cryptography. It can be concluded that when normal image security using steganographic and visual cryptographic technique is applied, it makes the task of the investigators unfeasible to decrypt the encoded secret message. The security features of the steganographic are highly optimized using genetic algorithm.