Skip to Main Content
This paper presents a new approach of steganography. The secret image is firstly perturbed by Stego-Key (SK) and again perturbed by a genetically generated, good, session based transposition operator (TO). In the next step this perturbed secret image is embedded within the host image by variable bit replacement using a hash function. At the time of extraction of secret image firstly perturbed image is extracted then by reverse engineering with the session based TO and SK the secret image is obtained.