IRJET-Firefly Algorithm Based Data Hiding Technique

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 03 Issue: 08 | Aug-2016

p-ISSN: 2395-0072

www.irjet.net

Firefly Algorithm Based Data Hiding Technique Vidya B1, Bhagya Shree S R2 1PG 2

Student, ATME College of Engineering, Mysuru

Associate professor, ATME College of Engineering, Mysuru

e-mail: vidyabpatel6646@gmail.com,srbhagyashree@yahoo.co.in ---------------------------------------------------------------------***--------------------------------------------------------------------At every distribution point, a digital signal is being

Abstract - In recent times a lot of work has been carried out in the field of reversible data hiding (RDH) to prevent

embedded with a watermark. If a certain copy of the

the secret data from theft, illegal copying and unlawful

act is obtained later, then entire watermark can be

reproduction. In RDH the cover image will be recovered

retrieved and the distribution source is known easily.

after extracting the secret data which was embedded in

In steganography the complete secret message will be

that image. Finding the best location to hide the

concealed into another different object which is known

secret data is an important task so that it will conceal the

as cover object, it may be in image form, data format,

existence of the message. This paper provides a reversible

audio / video. Cryptography is the technique, widely

data hiding technique based on Firefly algorithm (FA).

used for secured communication when there is an

The optimal location to hide the secret data will be found by firefly algorithm. The histogram shifting technique is

existence of third parties called adversaries. In general,

used to embed the secret data in the cover image.

cryptography is regarding establishing and examining

Histogram

increasing

the protocols that stop third parties or the community

interests due to their low computational complexity, high

from reading or accessing private messages. It provides

visual quality and can achieve good performance.

security but it is very complex method and occurrence

Techniques

have

attracted

of message can be obtained by the attackers using Key Words- Reversible Data Hiding, Firefly Algorithm,

various decoding techniques.

Histogram Shifting Technique.

Back Ground A. Amsaveni and C. Arunkumar [1] proposed an efficient data

1.INTRODUCTION

hiding scheme using firefly algorithm in spatial domain, this paper provides a reversible data hiding technique based on

Multimedia content transmission over the internet

Firefly algorithm (FA). The optimal location to hide the secret

creates plenty of security issues. These issues can be

data will be found by firefly algorithm. The histogram shifting

solved using the methods like, watermarking,

technique is used to embed the secret data in the cover

cryptography and steganography. In watermarking

image. Histogram Techniques have attracted increasing

process carrier signal is used to hide the digital

interests due to their low computational complexity, high

information, the information that is hidden should, but

visual quality and can achieve good performance. S. Picek and

it is not necessary to have a relation with carrier signal.

M. Golub [2] proposed a technique Evolutionary computation

Š 2016, IRJET

|

Impact Factor value: 4.45

|

ISO 9001:2008 Certified Journal

|

Page 1243


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.