A Novel Technique for Image Steganography Using Nonlinear Chaotic Map

被引:0
|
作者
Thenmozhi, S. [1 ]
Chandrasekaran, M. [2 ]
机构
[1] Anna Univ, Madras 600025, Tamil Nadu, India
[2] Govt Coll Engn, salem, Tamil Nadu, India
关键词
Steganography; Frequency Domain; DWT; Henon Map; Information Hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. The beauty of steganography technology comes out in more pronounced way when there is no absolute relation between stego and original image and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be more random and non-predictable, they can be made utilized in achieving the encryption. The transposition technology of encryption systems requires scrambleness behaviour in order to achieve the encryption of the data. This srambleness behaviour can be derived from the randomness property of chaos which can be better utilized in the techniques like transposition system. Firstly the henon mapping (chaos) is applied on the secret image and the two dimensional Discrete Wavelet Transform (2-D DWT) is performed on the cover image of size M x N. Then each bit of scrambled image is embedded in the high frequency coefficients resulted from Discrete Wavelet Transform. Image quality is to be improved by preserving the wavelet coefficients in the low frequency subband. The experimental results show that the algorithm has a high capacity and a good invisibility. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing initial conditions of the henon map.
引用
收藏
页码:307 / 311
页数:5
相关论文
共 50 条
  • [41] Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map
    Mokhnache, Abdelaziz
    Ziet, Lahcene
    [J]. TRAITEMENT DU SIGNAL, 2020, 37 (01) : 95 - 100
  • [42] An image authentication technique based on cross chaotic map
    Raju, Rija M.
    Gopakumar, K.
    [J]. 2014 First International Conference on Computational Systems and Communications (ICCSC), 2014, : 197 - 202
  • [43] Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling
    Chaudhary, Shikha
    Hiranwal, Saroj
    Gupta, C. P.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2159 - 2171
  • [44] Digital Image Steganography using Dithering Technique
    Biswas, D.
    Biswas, S.
    Majumder, A.
    Sarkar, D.
    Sinha, D.
    Chowdhury, A.
    Das, S. K.
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 251 - 255
  • [45] Image Transformation Technique Using Steganography Methods Using LWT Technique
    Kumar, Singamaneni Kranthi
    Reddy, Pallela Dileep Kumar
    Ramesh, Gajula
    Maddumala, Venkata Rao
    [J]. TRAITEMENT DU SIGNAL, 2019, 36 (03) : 233 - 237
  • [46] A Novel Image Hiding Technique Based on Stratified Steganography
    Mani, M. Radhika
    Eswari, G. Suryakala
    [J]. SMART COMPUTING AND INFORMATICS, 2018, 77 : 45 - 52
  • [47] High Secure Digital Image Steganography Based On 3D Chaotic Map
    Valandar, Milad Yousefi
    Ayubi, Peyman
    Barani, Milad J. Afari
    [J]. 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
  • [48] Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform
    Darani, A. Yousefian
    Yengejeh, Y. Khedmati
    Navarro, G.
    Pakmanesh, H.
    Sharafi, J.
    [J]. DIGITAL SIGNAL PROCESSING, 2024, 144
  • [49] A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography
    Liu, Jinyuan
    Wang, Yong
    Han, Qi
    Gao, Jerry
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2022, 32 (01):
  • [50] Image encryption using a novel hybrid chaotic map and dynamic permutation−diffusion
    Atul Kumar
    Mohit Dua
    [J]. Multimedia Tools and Applications, 2024, 83 : 32789 - 32812