International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 03 Issue: 08 | Aug-2016
p-ISSN: 2395-0072
www.irjet.net
Firefly Algorithm Based Data Hiding Technique Vidya B1, Bhagya Shree S R2 1PG 2
Student, ATME College of Engineering, Mysuru
Associate professor, ATME College of Engineering, Mysuru
e-mail: vidyabpatel6646@gmail.com,srbhagyashree@yahoo.co.in ---------------------------------------------------------------------***--------------------------------------------------------------------At every distribution point, a digital signal is being
Abstract - In recent times a lot of work has been carried out in the field of reversible data hiding (RDH) to prevent
embedded with a watermark. If a certain copy of the
the secret data from theft, illegal copying and unlawful
act is obtained later, then entire watermark can be
reproduction. In RDH the cover image will be recovered
retrieved and the distribution source is known easily.
after extracting the secret data which was embedded in
In steganography the complete secret message will be
that image. Finding the best location to hide the
concealed into another different object which is known
secret data is an important task so that it will conceal the
as cover object, it may be in image form, data format,
existence of the message. This paper provides a reversible
audio / video. Cryptography is the technique, widely
data hiding technique based on Firefly algorithm (FA).
used for secured communication when there is an
The optimal location to hide the secret data will be found by firefly algorithm. The histogram shifting technique is
existence of third parties called adversaries. In general,
used to embed the secret data in the cover image.
cryptography is regarding establishing and examining
Histogram
increasing
the protocols that stop third parties or the community
interests due to their low computational complexity, high
from reading or accessing private messages. It provides
visual quality and can achieve good performance.
security but it is very complex method and occurrence
Techniques
have
attracted
of message can be obtained by the attackers using Key Words- Reversible Data Hiding, Firefly Algorithm,
various decoding techniques.
Histogram Shifting Technique.
Back Ground A. Amsaveni and C. Arunkumar [1] proposed an efficient data
1.INTRODUCTION
hiding scheme using firefly algorithm in spatial domain, this paper provides a reversible data hiding technique based on
Multimedia content transmission over the internet
Firefly algorithm (FA). The optimal location to hide the secret
creates plenty of security issues. These issues can be
data will be found by firefly algorithm. The histogram shifting
solved using the methods like, watermarking,
technique is used to embed the secret data in the cover
cryptography and steganography. In watermarking
image. Histogram Techniques have attracted increasing
process carrier signal is used to hide the digital
interests due to their low computational complexity, high
information, the information that is hidden should, but
visual quality and can achieve good performance. S. Picek and
it is not necessary to have a relation with carrier signal.
M. Golub [2] proposed a technique Evolutionary computation
Š 2016, IRJET
|
Impact Factor value: 4.45
|
ISO 9001:2008 Certified Journal
|
Page 1243