Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption

被引:2
|
作者
Dash, Shreela [1 ]
Das, M. N. [2 ]
Das, Mamatarani [1 ]
机构
[1] CV Raman Coll Engn, Dept CSE, Bhubaneswar 752054, Odisha, India
[2] KIIT Univ, Sch Comp Sci, Bhubaneswar 751024, Odisha, India
关键词
Chaotic neural network (CNN); Matrix encoding; Region-based steganography;
D O I
10.1007/978-981-10-8055-5_48
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security is one of the challenging problems nowadays, and to solve this problem, a new algorithm which provides double layer security is proposed, by combining region-based steganography with chaotic encryption. Region-based steganography is the technique of protecting the hidden information in certain regions of interest, which is most efficient for data hiding. One of them is the edge region in image, which is most effective for data hiding. For encrypting data, we used CNN because of its random nature which is very challenging for hackers to know about the secret information. In the proposed work, the secret data are first encoded using CNN, and then, the scrambled message is embedded inside the edge region of cover image using matrix encoding scheme, which provides high security. The complete procedure is instigated in MATLAB, and the result analysis is given, which shows the strength of the technique.
引用
收藏
页码:535 / 544
页数:10
相关论文
共 50 条
  • [1] Secured Image transmission with GA based Audio Steganography
    Bhowal, Krishna
    Sarkar, D.
    Biswas, S.
    Sarkar, P. P.
    [J]. 2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [2] Secured Image Transmission Using Color Transformation Fragmented Mosaic, Chaos Based Encryption and LSB - Mapping Steganography Technique
    Manjula, Y.
    Shivakumar, K. B.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (13): : 58 - 66
  • [3] A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)
    Bandyopadhyay, Debiprasad
    Dasgupta, Kousik
    Mandal, J. K.
    Dutta, Paramartha
    Ojha, Varun Kumar
    Snasel, Vaclav
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS (IBICA 2014), 2014, 303 : 271 - 280
  • [4] Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT
    Singh, Priyanka
    Devi, K. Jyothsna
    Thakkar, Hiren Kumar
    Kotecha, Ketan
    [J]. IEEE ACCESS, 2022, 10 : 8974 - 8993
  • [5] Multi image encryption and steganography based on synchronization of chaotic lasers
    Mukhopadhyay, Sumona
    Leung, Henry
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4403 - 4408
  • [6] Image Segmentaion and Steganography for Secured Information Transmission
    Juneja, Mamta
    Sandhu, Parvinder Singh
    [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 617 - 620
  • [7] Transposition Based Symmetric Encryption and Decryption Technique for Secured Image Transmission through Internet
    Roslin, S. Emalda
    Nandhitha, N. M.
    Daniel, Anita
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1578 - 1583
  • [8] Secured encryption using chaotic carriers
    Lai, CH
    Zhou, CT
    Yu, MY
    [J]. PHYSICA SCRIPTA, 1999, 59 (03) : 198 - 203
  • [9] Secured Encryption using Chaotic Carriers
    Lai, C.H.
    Zhou, C.T.
    Yu, M.Y.
    [J]. Physica Scripta, 1999, 59 (2-3): : 198 - 203
  • [10] Chaotic image encryption based on finite field bidirectional diffusion and steganography
    Liu, Xiang
    Ding, Dawei
    Yang, Zongli
    [J]. 2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, : 218 - 222