Image steganography Based on Chaos Permutation, Authentication and Wiener Deconvolution

被引:0
|
作者
Sheidaee, Ali [1 ]
Asadpour, Mohammad [1 ]
Farzinvash, Leili [1 ]
机构
[1] Univ Tabriz, Fac Elect & Comp Engn, Tabriz, Iran
关键词
Steganography; Chaos Permutation; Authentication; deconvolution; Discrete Cosine Transform (DCT); ENCRYPTION SCHEME; ALGORITHM; CAPACITY; WAVELET;
D O I
10.1109/ICEE52715.2021.9544383
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image steganography refers to hiding a secret image into another meaningful one. Researchers have employed different algorithms such as wavelet transform, discrete cosine transform functions to transform secret image and different image processing algorithms like image encryption utilized to reach better stego images in case of imperceptibility and robustness. In most of researches, higher robustness methods have lower impeccability and vice versa. In this paper, we propose an adaptive LSB method using chaos permutation, DCT, and secret image authentication to increase both imperceptibility and robustness. Chaos permutation is a key feature in our work to improve the robustness of secret image against attacks and wiener filter deconvolution is employed to extract a clear secret image in receiver side, which has the lowest noise in comparison with the original secret image. The improvement of our proposed method have been analyzed and evaluated by different criteria such as PSNR, SSIM and Histogram plots.
引用
收藏
页码:573 / 578
页数:6
相关论文
共 50 条
  • [1] Binary image steganography based on permutation
    Juvet Karnel Sadié
    Stéphane Gael R. Ekodeck
    René Ndoundam
    [J]. Iran Journal of Computer Science, 2023, 6 (4) : 321 - 332
  • [2] Chaos based Edge Adaptive Image Steganography
    Roy, Ratnakirti
    Sarkar, Anirban
    Changder, Suvamoy
    [J]. FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 138 - 146
  • [3] Chaos based spread spectrum image steganography
    Satish, K
    Jayakar, T
    Tobin, C
    Madhavi, K
    Murali, K
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 587 - 590
  • [4] A probabilistic image authentication method based on chaos
    Tuncer, Turker
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (16) : 21463 - 21480
  • [5] A probabilistic image authentication method based on chaos
    Türker Tuncer
    [J]. Multimedia Tools and Applications, 2018, 77 : 21463 - 21480
  • [7] Improvements of image sharing with steganography and authentication
    Yang, Ching-Nung
    Chen, Tse-Shih
    Yu, Kun Hsuan
    Wang, Chung-Chun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1070 - 1076
  • [8] Digital Image Authentication Model Based on Edge Adaptive Steganography
    Grover, Nidhi
    Mohapatra, A. K.
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 238 - 242
  • [9] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [10] Authentication of Secret Information in Image Steganography
    Babu, K. Suresh
    Raja, K. B.
    Kumar, Kiran K.
    Devi, Manjula T. H.
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1659 - +