A Multiplicative-Additive Chaotic-Address Steganography

Authors

  • Haneen H. Alwan University of Kufa, Najaf 54001, Iraq
  • Zahir M. Hussain University of Kufa, Najaf 54001, Iraq

DOI:

https://doi.org/10.31642/JoKMC/2018/070204

Keywords:

Chaos theory, Chaotic maps, Lyapunov exponents, Steganography, Data Security

Abstract

In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the chaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are introduced for image steganography in the spatial domain. The first system is based on the well-known LSB technique, the second system is based on looking for the identical bits between the secret message and the cover image and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits with cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the Chaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results show that the proposed methods perform better than existed systems.

Downloads

Download data is not yet available.

References

S. S. A. K. Singh and S. P. Ghrera, "A Recent Survey On Data Hiding Techniques," International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), 2017.

A. Sharif, M. Mollaeefar and M. Nazari, "A novel method for digital image steganography based on a new three-dimensional chaotic map," Springer Science,Business Media New York, 2016. DOI: https://doi.org/10.1007/s11042-016-3398-y

A. Rasmi and M. Mohanapriya, "An Extensiv Survey of Data Hiding Techniques," European Journal of Applied Sciences 9 (3): 133-139, 2017 ISSN 2079-2077 © IDOSI Publications, 2017 DOI: 10.5829/idosi.ejas.2017.133.139, 2017.

O. N. Kadhim and Z. M. Hussain, "Information Hiding using Chaotic-Address Steganography," Journal of Computer Science, 2018. DOI: https://doi.org/10.3844/jcssp.2018.1247.1266

H. Elkamchouchi, W. M. Salama and Y. Abouelseoud, "Data hiding in a digital cover image using chaotic maps and LSB technique,"12th International Conference on Computer Engineering and Systems (ICCES), 2017. DOI: https://doi.org/10.1109/ICCES.2017.8275302

A. Anees, A. M. Siddiqui, J. Ahmed and I. Hussain, "A technique for digital steganography using chaotic maps," Springer Science,Business Media Dordrecht, 2013. DOI: https://doi.org/10.1007/s11071-013-1105-3

S. Dogan, "A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map," I. J. Computer Network and Information Security, 2018. DOI: https://doi.org/10.5815/ijcnis.2018.01.01

G. P. Williams, Chaos Theory Tamed book, JOSEPH HENRY PRESS Washington, 1997. DOI: https://doi.org/10.1201/9781482295412

N. Ramadan, H. E. H. Ahmed, S. E. Elkhamy and F. E. Abd El-Samie, "Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map," American Journal of Signal Processing, DOI: 10.5923/j.ajsp.20160601.01,

S. Kehui, Chaotic Secure Communication, Berlin/Boston: Tsinghua University Press and Walter de Gruyter GmbH., 2016.

A. BAG and B. GANGULI, "METHODS TO DETECT CHAOS AND BIFURCATION ANALYSIS," Diss. 2015.

G. A. Gottwald and I. Melbourne, "The 0-1 Test for Chaos: A review," Springerlink, Part of the Lecture Notes in Physics book series (LNP, volume 915), 4 March 2016. DOI: https://doi.org/10.1007/978-3-662-48410-4_7

A. D. Ker, "Steganalysis of LSB Matching in Grayscale Images, " IEEE signal processing letters 12.6 (2005): 441-444. DOI: https://doi.org/10.1109/LSP.2005.847889

H. Hiary, K. . E. Sabri, M. S. Mohammed and A. Al-Dhamari, "A Hybrid Steganography System based on LSB Matching and Replacement," (IJACSA) International Journal of Advanced Computer Science and Applications, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.070951

Downloads

Published

2021-11-01

How to Cite

Alwan, H., & Hussain, Z. . (2021). A Multiplicative-Additive Chaotic-Address Steganography. Journal of Kufa for Mathematics and Computer, 7(2), 16–25. https://doi.org/10.31642/JoKMC/2018/070204

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.