Preparation of Papers for ICIET Conferences: Embedded Data With Image Using Chaos Based Particle Swarm Optimization(PSO)
G.Dhivyakamatchi, K.L.N. College of Engineering; K.Banupriya ,; B.M.Nagarajan ,
Data hiding, information security, Genetic Algorithm, Particle Swarm Optimization, Chaos, chaos map
Data hiding is also known as data encapsulation or information hiding, it reduces system complexity for increased robustness .Proposed approach provides optimal solution for performing data hiding. The goal of data hiding technique is to embed the secret data into the cover image with minimum changes in the pixel values. Here the secret data is generated and embedded into the cover image by random function of MATLAB and various chaotic map approaches. Then the embedded image is send to the Particle Swarm Optimization technique (PSO).In this technique, optimal solution is achieved which is calculated based on the maximal Peak Signal to Noise Ratio (PSNR) value. So, the final stego image which is obtained has the minimal changes in the pixel values .In this Project, long running time will get reduce.
-
[1] Baykasoglu A (2012) Design optimization with chaos embedded great deluge algorithm. Appl Soft Comput 12:1055–1067
[2] Caponetto R, Fortuna L, Fazzino S, Gabriella M (2003) Chaotic sequences to improve the performance of evolutionary algorithms. IEEE Trans Evol Comput 7:289–304
[3] El-Emam NN (2015) New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. Comput Secure 55:21–45
[4] Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New York
[5] Jawad K, Khan A (2013) Genetic algorithm and difference expansion based reversible watermarking for relational databases. J Syst Soft 86(11):2742–2753
[6] Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fractals 32(5):1749–1759.
[7] Kannan HR, Nazer B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130
[8] Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302
[9] Kurban T, Civicioglu P, Kurban R, Besdok E (2014) Comparison of evolutionary and swarm based computational techniques for multilevel color image thresholding. Appl Soft Comput 23:128–143
[10] Lin CC, TsaiWH(2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
[11] Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177(15):3099–3109
[12] Schaefer R (2007) Foundations of global genetic optimization. Springer, Berlin
[13] Yang D, Liu Z, Zhou J (2014) Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimization. Commun Nonlinear Sci Numer Simul 19:1229–1246.
[14] Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats. JSyst Softw 98:140–154.
[15] ZhangW,MaK,YuN(2014) Reversibility improved data hiding in encrypted images. Sig Process 94:118-127.
Paper ID: GRDCF002034
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 150 - 156
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 150 - 156