Design of Efficient Chaos Based Image Steganographic System (original) (raw)

Wavelet Based Image Steganographic System Using Chaotic Signals

—The main requirements of efficient steganographic systems are transparency, robustness and security. In this work, the proposed system is designed to achieve these requirements, as follows: to increase the transparency and robustness, the proposed system uses the transform domain technique, in this case the wavelet domain technique to embed the color secret image into the color cover image. To achieve high security, chaotic systems are used to accomplish the following two purposes: firstly to scramble the secret color image before hiding it into the color cover image, secondly to randomly select the embedding positions in the cover image. Three chaotic systems with many combinations are used for the scrambling and the embedding process. Experimental results including Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Correlation, Signal to Noise Ratio (SNR) and embedding capacity demonstrate that the proposed system has good performance as compared with other existing methods without attack and under different types of attacks such as filtering and noise attacks. Simulation results show that the combination of chaotic systems providing the best performance include the use of Logistic and Hénon maps for the embedding process and Arnold´s cat map for the encryption process. The MSE, PSNR, correlation, SNR and embedding capacity obtained in this case reach up to 0.0010, 78.1dB, 0.9999, 67.2dB and 0.39% respectively when the secret image is Airplane with 32x32 pixels and the cover image is Girl with 512x512 pixels. For the extracted secret image, the chaotic system set that provides the best performance includes the use of Arnold´s cat map for the encryption process. The MSE, PSNR, correlation and SNR obtained in this case reach up to 0.0846, 58.9dB, 1 and 56.1dB respectively. As compared with other methods, the proposed method achieves gains without any attack of 8.2dB for the stego image and 32.4dB for the extracted secret image in PSNR when the secret image is Airplane with 256x256 pixels and the cover image is Girl with 512x512 pixels.

Robust Steganography Technique for Embedding Secret Images

Halabja University Journal

Steganography is a technique used to disguise the existence of a secret communication. It is used in many fields to solve information security problems. Steganography is a technique to embed secret data in a carrier image and obtain a new image that can't actually be distinguished from the original image. This paper proposes steganography method based on least significant bit (LSB) replacement and integer wavelet transform IWT through lifting scheme to achieve high quality of stego image. we will do some pre-processing on the secret image before embedding process. IWT transforms the secret image from spatial domain to a frequency domain and will be divided it into a group of sub-bands, some of which we will use for their utmost importance and ignore some of them. We have embedded the secret image in a sequential LSB method and in a randomly LSB method and also by the method LSB matching. But after applying our proposed method to the secret image and then embedded it in each of t...

High PSNR Based Image Steganography

In recent time, the Steganography technique is broadly used for the secret data communication. It " s an art of hiding the secret data in another objects like videos, images, videos, graphics and documents to gain the stego or steganographic object so which it " s not affected by the insertion. In this paper, we are introducing a new methodology in which security of stego-image increase by embedding even and odd part secret image into R, G, B plane of cover image using LSB and ISB technique. As we can see from the results session the value of PSNR , NCC are getting increase while the value of MSE is getting decrease.

Spread Embedding Technique in LSB Image Steganography based on Chaos Theory

2019 International Seminar on Application for Technology of Information and Communication (iSemantic), 2019

Spread spectrum technique is one way to increase the security and imperceptibility of messages embedded in stego images. The way this method works is by embedding it spreadly and randomly to all images with certain random patterns. Generally, random patterns are implemented using modulation and PN sequence generators. In this research, spread spectrum embedding techniques are implemented with chaotic encryption. Generally, chaotic encryption is done on the message image, but in this research, chaos encryption is applied to the cover image with the aim of spreading the message. Chaos encryption is chosen because this method only randomizes pixel coordinates without changing pixel values. In this way, the message embedding on the smallest bit of the cover image is carried out in a spread with chaotic patterns so that the attacker is not easily guessed. Chaotic patterns will be formed from the Arnold chaotic map formula with parameters determined from password processing, the goal being that patterns are formed more dynamically. In addition, during the embedding process, the message is encrypted with the XOR operation based on the MSB value. Based on testing the proposed method proved to be safer and slightly more imperceptible compared to the previous method.

A New Algorithm for a Steganography System

2015

Steganography is the workmanship and study of concealing mystery information to provide a safe communication between two parties. This paper, displays other steganographic algorithms for implanting encoded secret image in grayscale and color images to give abnormal state security of information for correspondence over unsecured channels. The proposed algorithms first analyze the secret image using 1level -DWT and SLT respectively. It will be then encrypted the low frequency components of the secret image only using AES method and then embedded in the insensitive mid and high sub-bands gotten from the cover image in the wake of applying 2levelDWT and SLT on it, The embedding method used in this paper is LSB, the resulting image called stego-image form different algorithms are then compared. .By using the proposed algorithms the capacity of the hidden secret data and stego image quality are improved. The embedding image reaches to half the size of cover image at same time PSNR reach t...

An efficient steganographic technique based on chaotic maps and adpative PPM embedding

IEEE Computer Society, 2013

Steganography and Cryptography proposes popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the contents of message itself. Both the methods can be combined by encrypting message using cryptography and then hiding the encrypted message using steganography. The resulting stego-image can be transmitted without revealing that secret information is being concealed. Presently we have very secure methods for both cryptography and Steganography - chaotic algorithm is highly secured among existing technique for cryptography and the Steganography methods, which use spatial domain operations called pixel pair matching (PPM) are highly efficient. The encrypted and scrambled data is embedded in to the cover media based on pixel pair matching technique. Therefore, the idea of applying both of them together is presented with more security levels and got a very highly secured system for data embedding.

Improvement of Image Steganography Scheme Based on LSB Value with Two Control Random Parameters and Multi-level Encryption

IOP Conference Series: Materials Science and Engineering

Recently, steganography has played an important part in the field of communication, especially in image steganography. The major points of image steganography are the image quality (imperceptibility) of the stego image and the security of the system towards stopping the recoverability of the secret data. A new steganography scheme based on two control random parameters and multi-level encryption can address the security challenge while the P_Even/P_Odd classification can ensure the imperceptibility of the stego image. The objectives of study to increase the security and PSNR of the image by using the Huffman coding technique to compress the secret data prior to embedding; this will also ensure an increase in the payload capacity. The proposed scheme takes effect after encrypting and compressing the secret data. It is deployed when matching the secret bits with the LSB during embedding to determine 0 (P_Even) and 1 (P_Odd) while classifying the secret message to track and map each bit in the stego image. The results showed the embedding of the secret message based on P_Even/P_Odd with two control random parameters and multi-level encryption to improve the steganography.

Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map

Steganography is the art and science of hiding secret information into digital media with the intention to transmit this information. Most of the steganographic methods either use spatial domain or frequency domain for embedding the secret information. Current hybrid methods require the original cover image to extract the secret information making these methods to become not practical. This paper proposes a new blind steganographic method for digital images that combines spatial and frequency domains and does not rely on the cover image in extracting the secret information. The proposed method utilizes a chaotic map to scramble the secret information before the embedding procedure takes place. A coding map is generated during the work on spatial domain, and the original image is transformed into DWT domain, then the generated coding map is embedded in the coefficients of LL and HL sub-bands of the cover image. The drawn experimental results show that the resultant stego-images have high quality and the proposed method provides high embedding capacity compared with other methods and is robust against the visual analysis and other image processing attacks such as lossy compression and added noise.  Index Terms-steganography, spatial domain, frequency domain, Haar-DWT, chaotic map. Engineering and Technology Publishing Figure 2. A general steganography system showing the embedding and the extracting processes. denotes to the cover image and denotes to the stegoimage (the cover after embedding the secret information)

An Approach for Embedding the Colored Secret Image based on Multi-Cover Sharing Scheme

Association of Arab Universities Journal of Engineering Sciences, 2018

Cryptography and steganography are the two major techniques used for securing the information during communication. This paper proposed an algorithm for cryptography and steganography based on image sharing and chaotic system (ISCS), Where the ISCS algorithm has been applied to perform three operation. firstly, encrypt the secret color image based on Lorenz chaotic map. Then, sharing the cipher image to n shadow based on secret sharing scheme. Finally, embedding n shadow with n cover images. Several security analysis for image encryption are used, such as secret key space and sensitivity, histogram, autocorrelations, entropy, and differential analysis. The peak signal to noise ratio PSNR is used for testing and measuring the quality and performance for cover images of the proposed algorithm. With numerical simulation results, The proposed ISCS algorithm have high level for security, large key space for image encryption and high payload capacity reached to 0.75 M of pixels that embedding in four cover images size (512*512) with quality reached to 44 db of PSNR.

Security and imperceptibility improving of image steganography using pixel allocation and random function techniques

International Journal of Electrical and Computer Engineering (IJECE), 2022

Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.