A Multiplicative-Additive Chaotic-Address Steganography
DOI:
https://doi.org/10.31642/JoKMC/2018/070204Keywords:
Chaos theory, Chaotic maps, Lyapunov exponents, Steganography, Data SecurityAbstract
In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the chaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are introduced for image steganography in the spatial domain. The first system is based on the well-known LSB technique, the second system is based on looking for the identical bits between the secret message and the cover image and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits with cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the Chaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results show that the proposed methods perform better than existed systems.Downloads
References
S. S. A. K. Singh and S. P. Ghrera, "A Recent Survey On Data Hiding Techniques," International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), 2017.
A. Sharif, M. Mollaeefar and M. Nazari, "A novel method for digital image steganography based on a new three-dimensional chaotic map," Springer Science,Business Media New York, 2016. DOI: https://doi.org/10.1007/s11042-016-3398-y
A. Rasmi and M. Mohanapriya, "An Extensiv Survey of Data Hiding Techniques," European Journal of Applied Sciences 9 (3): 133-139, 2017 ISSN 2079-2077 © IDOSI Publications, 2017 DOI: 10.5829/idosi.ejas.2017.133.139, 2017.
O. N. Kadhim and Z. M. Hussain, "Information Hiding using Chaotic-Address Steganography," Journal of Computer Science, 2018. DOI: https://doi.org/10.3844/jcssp.2018.1247.1266
H. Elkamchouchi, W. M. Salama and Y. Abouelseoud, "Data hiding in a digital cover image using chaotic maps and LSB technique,"12th International Conference on Computer Engineering and Systems (ICCES), 2017. DOI: https://doi.org/10.1109/ICCES.2017.8275302
A. Anees, A. M. Siddiqui, J. Ahmed and I. Hussain, "A technique for digital steganography using chaotic maps," Springer Science,Business Media Dordrecht, 2013. DOI: https://doi.org/10.1007/s11071-013-1105-3
S. Dogan, "A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map," I. J. Computer Network and Information Security, 2018. DOI: https://doi.org/10.5815/ijcnis.2018.01.01
G. P. Williams, Chaos Theory Tamed book, JOSEPH HENRY PRESS Washington, 1997. DOI: https://doi.org/10.1201/9781482295412
N. Ramadan, H. E. H. Ahmed, S. E. Elkhamy and F. E. Abd El-Samie, "Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map," American Journal of Signal Processing, DOI: 10.5923/j.ajsp.20160601.01,
S. Kehui, Chaotic Secure Communication, Berlin/Boston: Tsinghua University Press and Walter de Gruyter GmbH., 2016.
A. BAG and B. GANGULI, "METHODS TO DETECT CHAOS AND BIFURCATION ANALYSIS," Diss. 2015.
G. A. Gottwald and I. Melbourne, "The 0-1 Test for Chaos: A review," Springerlink, Part of the Lecture Notes in Physics book series (LNP, volume 915), 4 March 2016. DOI: https://doi.org/10.1007/978-3-662-48410-4_7
A. D. Ker, "Steganalysis of LSB Matching in Grayscale Images, " IEEE signal processing letters 12.6 (2005): 441-444. DOI: https://doi.org/10.1109/LSP.2005.847889
H. Hiary, K. . E. Sabri, M. S. Mohammed and A. Al-Dhamari, "A Hybrid Steganography System based on LSB Matching and Replacement," (IJACSA) International Journal of Advanced Computer Science and Applications, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.070951
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Haneen H. Alwan, Zahir M. Hussain
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.