Image steganography using genetic algorithm for cover image selection and embedding

被引:1
|
作者
Shyla, M.K. [1 ]
Kumar, K.B. Shiva [2 ]
Das, Rajendra Kumar [3 ]
机构
[1] Department of Electronics and Communication Engg., SSIT, Tumakuru, Karnataka, India
[2] Professor and H.O.D, Department of Electronics and Telecommunication Engg., SSIT Tumakuru, Karnataka, India
[3] Principal, DRIEMS, Cuttack,TangiOdisha, India
来源
Soft Computing Letters | 2021年 / 3卷
关键词
D O I
10.1016/j.socl.2021.100021
中图分类号
学科分类号
摘要
29
引用
收藏
相关论文
共 50 条
  • [41] Image Steganography using RSA Algorithm for Secure Communication
    Preksha, B.
    Harish, Rishika
    Sreenivas, B.
    Vasanthalakshmi, M.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [42] An Efficient Algorithm of Steganography Using JPEG Colored Image
    Goswami, Sudhir
    Goswami, Jyoti
    Mehra, Rajesh
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [44] A high capacity image steganography using multi-layer embedding
    Tang, Mingwei
    Hu, Jie
    Song, Wen
    [J]. OPTIK, 2014, 125 (15): : 3972 - 3976
  • [45] Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited
    Guo, Linjie
    Ni, Jiangqun
    Su, Wenkang
    Tang, Chengpei
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2669 - 2680
  • [46] Satellite Image Steganography using High degree Compressed Embedding Technique
    Rohith, G.
    Bhuvaneswari, M.
    Nithyapriya, S.
    Kannaki, S.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 181 - 187
  • [47] Steganography of capacity required using modulo operator for embedding secret image
    Wang, SJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 99 - 116
  • [48] Image feature selection based on genetic algorithm
    Lei, Liang
    Peng, Jun
    Yang, Bo
    [J]. Lecture Notes in Electrical Engineering, 2013, 219 LNEE (VOL. 4): : 825 - 831
  • [49] A secured image steganography method based on ballot transform and genetic algorithm
    Hossain, Sabbir
    Mukhopadhyay, Souradeep
    Ray, Biswarup
    Ghosal, Sudipta Kr
    Sarkar, Ram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 38429 - 38458
  • [50] A secured image steganography method based on ballot transform and genetic algorithm
    Sabbir Hossain
    Souradeep Mukhopadhyay
    Biswarup Ray
    Sudipta Kr Ghosal
    Ram Sarkar
    [J]. Multimedia Tools and Applications, 2022, 81 : 38429 - 38458