TY - JOUR ID - 144759 TI - Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm JO - The ISC International Journal of Information Security JA - ISECURE LA - en SN - 2008-2045 AU - Sabeti, Vajiheh AU - Amerehei, Mahsa AD - Department of Computer Engineering, Faculty of Engineering, Alzahra University, Tehran, Iran. Y1 - 2022 PY - 2022 VL - 14 IS - 2 SP - 167 EP - 179 KW - Digital Steganography KW - Steganalysis KW - Discrete Wavelet transform KW - Genetic Algorithm DO - 10.22042/isecure.2022.274305.641 N2 - A steganography system must embed the message in an unseen and unrecognizable manner in the cover signal. Embedding information in transform coefficients, especially Discrete Wavelet Transform (DWT), is one of the most successful approaches in this field. The proposed method in this paper has two main steps. In the first step, the XOR logical function was used to embed two bits of data in the adjacent DWT coefficient pair. No change in the coefficients will occur if the XOR result of the two bits of low-value data of the two adjacent coefficients is identical to the two bits of secret data. Otherwise, one or both of the coefficient(s) will need a one-unit increase or decrease. In the second step, the genetic algorithm was used to select, between the two possible solutions, a new value for the adjacent coefficient pair that needs to be changed. Using the genetic algorithm, the selections were made such that the generated stego image experienced the least change relative to the cover image. The results of comparing this method with the existing methods in low- and high-level embedding showed that the proposed method was successful in producing stego images with high-quality criteria. In addition, the SPAM steganalysis method did not show high accuracy in its detection. One of the benefits of the proposed method is the need for a short key to embed and extract the secret message. This issue increases the security and feasibility of the proposed method. UR - https://www.isecure-journal.com/article_144759.html L1 - https://www.isecure-journal.com/article_144759_fec49b3d8373c327a65ec124567262a2.pdf ER -