A Novel Technique for Image Steganography Using Nonlinear Chaotic Map

被引:0
|
作者
Thenmozhi, S. [1 ]
Chandrasekaran, M. [2 ]
机构
[1] Anna Univ, Madras 600025, Tamil Nadu, India
[2] Govt Coll Engn, salem, Tamil Nadu, India
关键词
Steganography; Frequency Domain; DWT; Henon Map; Information Hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. The beauty of steganography technology comes out in more pronounced way when there is no absolute relation between stego and original image and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be more random and non-predictable, they can be made utilized in achieving the encryption. The transposition technology of encryption systems requires scrambleness behaviour in order to achieve the encryption of the data. This srambleness behaviour can be derived from the randomness property of chaos which can be better utilized in the techniques like transposition system. Firstly the henon mapping (chaos) is applied on the secret image and the two dimensional Discrete Wavelet Transform (2-D DWT) is performed on the cover image of size M x N. Then each bit of scrambled image is embedded in the high frequency coefficients resulted from Discrete Wavelet Transform. Image quality is to be improved by preserving the wavelet coefficients in the low frequency subband. The experimental results show that the algorithm has a high capacity and a good invisibility. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing initial conditions of the henon map.
引用
收藏
页码:307 / 311
页数:5
相关论文
共 50 条
  • [1] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Mahmoudi, Fariborz
    Mirzaei, Khadije
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
  • [2] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Faridnia, Saed
    Sadeghi, Hossein
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
  • [3] A novel image steganography using chaotic map and visual model
    Liu, Peipei
    Zhu, Zhongliang
    Wang, Hongxia
    Yan, Tianyun
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
  • [4] Chaotic map based random image steganography using LSB technique
    Rajendran, Sujarani
    Doraipandian, Manivannan
    [J]. International Journal of Network Security, 2017, 19 (04) : 593 - 598
  • [5] A novel color image LSB steganography using improved 1D chaotic map
    Pak, Chanil
    Kim, Jonggun
    An, Kwangil
    Kim, Changho
    Kim, Kwanghun
    Pak, Cholmyong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) : 1409 - 1425
  • [6] A novel color image LSB steganography using improved 1D chaotic map
    Chanil Pak
    Jonggun Kim
    Kwangil An
    Changho Kim
    Kwanghun Kim
    Cholmyong Pak
    [J]. Multimedia Tools and Applications, 2020, 79 : 1409 - 1425
  • [7] A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach
    Abdulhammed, Omar Younis
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (01): : 226 - 248
  • [8] A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach
    Omar Younis Abdulhammed
    [J]. The Journal of Supercomputing, 2024, 80 : 226 - 248
  • [9] A DNA Based Image Steganography using 2D Chaotic Map
    Das, Prasenjit
    Kar, Nirmalya
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [10] Novel Method of 3D Image Steganography Using LZW Technique and Chaotic Neural Network
    Vani, B. Geetha
    Prasad, E. V.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 1 - 9