Image Steganography Based On Non Linear Chaotic Algorithm (original) (raw)

Steganography Using Enhanced Chaotic Encryption Technique

In recent years, there is considerable interest in using the chaotic solutions of simple nonlinear dynamical systems [1] for encrypting the data. Baptista [2] has demonstrated how to use the chaotic solutions of Logistic equation for encryption. In order to increase the efficiency, we extended the method for a two coupled logistic equation . In this method, we divide the available phase space of a two coupled logistic equation into 94X94 boxes, each of which are associated with a pair of alphabets. A sender divides his messages into pairs of alphabets and identifies the associated box in the phase space. For this purpose, the two coupled logistic equation is iterated until the chaotic trajectory reaches the identified box. The corresponding iteration number is converted into its equivalent binary. The binary data is embedded into an image using standard steganographic technique and it is transmitted to the receiver. The receiver does the reverse operation for identifying the text. The similar process is repeated for all pairs of alphabets.

A Multiple-Chaotic Approach for Steganography

Journal of Computer Science

In a recent work, chaos has been utilized to modify addresses of message bits while hidden in a cover image. In this study, we extend the above technique to include multiple chaotic maps for increased security. Three systems have been modified using chaotic-address mapping for image steganography in the spatial domain. The first system, the well-known LSB technique, is based on the selection of pixels and then hides secret message in the Least Significant Bits LSBs of the given pixel. The second system is based on searching for the identical bits between the secret message and the cover image. The third system is based on the concept of LSB substitution. It employs mapping of secret data bits onto the cover pixel bits. To increase the security performance of the above chaos-based steganographic techniques, multiple-chaotic maps are introduced in this study by using multiple formulas to generate chaotic sequences used to track the addresses of shuffled bits. The generated chaotic sequences were evaluated to determine the randomness (using correlation tests) and the chaotic characteristics of a nonlinear system (using Lyapunov exponent, Poincaré section and 0-1 test). The performance and security levels of the proposed techniques were evaluated by using Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis. The results show that the proposed method performs existing systems.

A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain

International Journal of Security, Privacy and Trust Management, 2014

This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for embedding secret message. The most important requirement for a steganographic algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the proposed technique over the base technique of 3-3-2 LSB insertion.

A technique for digital steganography using chaotic maps

Nonlinear Dynamics, 2013

Chaos has been applied extensively in secure communication over the last decade, but most of the chaotic security protocols defined, are cryptographically weak or slow to compute. Also, study of chaotic phenomena as application in security area is not discussed in detail. In this paper, we have intensely studied chaos, their influence in secure communications and proposed a steganography technique in spatial domain for digital images based upon chaotic maps. By applying chaos effectively in secure communication, the strength of the overall anticipated algorithm has been increased to a significant level. In addition, few security statistical analyses such as correlation, entropy, energy, contrast, homogeneity, peak

A novel method for digital image steganography based on a new three-dimensional chaotic map

Multimedia Tools and Applications, 2016

This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a hot topic in recent researches. The proposed scheme possess novelties and advantageous such as: 1) Introducing a novel 3-dimensional chaotic map (LCA map) with strong chaotic characteristics and maximum Lyapunov exponent 20.58, which is used for generating three chaotic sequences, each of them represents the number of row, column, and colour component, respectively. 2) Utilizing random selection procedure for selecting subsequences with length of 2L, which L is the length of secret message 3) Specifying L pairs of triples host positions for embedding LSBs and MSBs of secret message by using three high level chaotic maps. 4) Entering some parameters dependent on elementary initial values, host image, and secret message features as a key point for adding additional layer of security alongside providing high sensitivity. 5) Providing high capacity for embedding secret message, which is equal to 50 % of whole image capacity (M × N × 12). The proposed method could be applied in different criterion such as, confidential communication and data storing, protection of data alteration, and etc. Our experimental results guarantees that our scheme is not only robust against differential attacks, but also has promising results such as highly sensitive keys, Quality index, PSNR, MSE, and hiding capacity as shown in statistical security analysis.

Image Steganography using Index based Chaotic Mapping

Ijca Proceedings on International Conference on Distributed Computing and Internet Technology, 2015

There have been many techniques for hiding messages in images in such a manner that the alterations made to the image are perceptually indiscernible. The Least-significant bit (LSB)-based approach is the most popular type of steganographic algorithm. However, we find that in most existing approaches the choice of embedding positions within the cover image are not secure enough. In this paper, we have used 1D chaotic logistic map to generate the pseudo random numbers; the index values of the sorted pseudo random numbers are the positions used to embed the message in the cover image. This technique provides sufficient security as the same set of numbers cannot be generated without knowing the exact key and thus the message is more secure. The proposed technique has been applied and tested successfully on various images producing significant results.

A High Capacity Image Steganography Method Using Lorenz Chaotic Map

2013

This paper proposed a high payload image steganography method based on modulus parts of Kekre’s Advanced Multiple LSB Algorithm (KAMLA) and Lorenz chaotic map. In the proposed method a 256 by 256 color image is embedded in a 512 by 512 cover image with acceptable imperceptibility. Experimental results showed that proposed algorithm sustains a higher confidentiality and still can provide high capacity as compared to KAMLA hiding algorithm. Keywords— image, steganography, chaos, Lorenz, payload, KAMLA

Improved LSB method for Image Steganography using H´enon Chaotic Map

Open Journal of Information Security and Applications, 2014

Image steganography conceals secret information in a cover image .It is used for secure data transfer. Various LSB (least significant bits) approaches have been used over the years in steganography. This paper proposes a novel technique to improve the conventional LSB technique for image steganography by using pseudo random number generation using Hénon chaotic map. The random numbers are used to encrypt the hide image which is embedded in the cover picture. This encryption using pseudo random generator provides sufficient security to the payload as the same set of random numbers cannot be regenerated without knowing the exact random generator function and thus the secret data cannot be retrieved easily. The proposed technique has been tested successfully on various .jpg files and corresponding PSNR values have been calculated.

High capacity double precision image steganography based on chaotic maps

Steganography is the process of hiding confidential information within nonsecret multimedia such that the 3 rd party cannot distinguish if there is a secret message in it or not. Whereas cryptography is the technique of using mathematical concepts to convert information into unreadable codes via a key. This paper will propose two approaches, lossless and lossy image steganography. Both of them will use cryptography and steganography based on three different chaotic maps to ensure information security. In the cryptography part, two chaotic maps will be used to encrypt the secret information, while in the steganography section, one chaotic map is used to embed the message. The secret information will be concealed in the least significant bits (LSBs) of the double-precision image's pixels. The double precision image is a high-quality image and can be represented in 64 bits per pixel for grayscale images, leading to a very high redundant bit. Simulation results show a high embedding capacity of 60.938% and 400% for lossless and lossy approaches respectively with a peak signal to noise ratio (PSNR) reach of 69.964 dB. Furthermore, this system is extremely secure due to the use of 3 chaotic maps with key space 2 448 .

Adaptive LSB Steganography Based on Chaos Theory and Random Distortion

Advances in Electrical and Computer Engineering, 2018

Image steganography is a technique to hide secret information in an image without leaving any apparent evidence of image alteration. Hiding capacity, perceptual transparency, robustness, and resistance against attack must be considered as characteristics of the image steganography algorithms. In this study, Improved Chaos Based Bit Embedding has been proposed as a new steganography algorithm. It is based on two basic principles. One of them is determining the bits in which the secret data will be embedded by logistic map and the other one is embedding the secret data into only one of the three color channels that is chosen randomly. It distorts the other remaining channels so that it is harder to obtain the text within the image by an unwanted person. The proposed algorithm has been tested on 10 sample images along with the four basic steganography algorithms: Least Significant Bit Embedding, Pseudo Random Least Significant Bit Embedding, EzStego, and F5. It has been seen that generating unpredictable indexes by the chaotic random number generators, and embedding the secret data into only one of the three channels (distorting remaining channels) increased resistance against attacks. Perceptual transparencies and capacity ratio of the proposed algorithm are compatible with the other four algorithms.