Multi image encryption and steganography based on synchronization of chaotic lasers

被引:1
|
作者
Mukhopadhyay, Sumona [1 ]
Leung, Henry [1 ]
机构
[1] Univ Calgary, Schulich Sch Engn Elect & Comp Engn, Calgary, AB, Canada
关键词
nonlinear dynamics; chaotic laser systems; synchronization; multiple images; cryptography; steganography; WATERMARKING;
D O I
10.1109/SMC.2013.751
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes a scheme for achieving steganography with multiple encrypted monochromatic images with keys obtained from a synchronized system of semiconductor lasers. The key selection scheme for steganography determines the robustness of the application. It is in this area that steganography may benefit from the properties of chaos synchronization. The encryption principle of the new algorithm is analyzed quantitatively by various statistical tests. The cover image used in the technique is also obtained from the visual representation of the chaotic sequences. This new scheme enjoys the benefit of added security, high key space, high embedding capacity, imperceptibility and robustness of the hidden information in conjunction with Least Significant Bit (LSB) based substitution. The result is important from the perspective of introducing a mechanism to multiplex and simultaneously transmit multiple images.
引用
收藏
页码:4403 / 4408
页数:6
相关论文
共 50 条
  • [1] Multi-image encryption based on synchronization of chaotic lasers and iris authentication
    Banerjee, Santo
    Mukhopadhyay, Sumona
    Rondoni, Lamberto
    [J]. OPTICS AND LASERS IN ENGINEERING, 2012, 50 (07) : 950 - 957
  • [2] Image encryption based on synchronization of fractional chaotic systems
    Xu, Yong
    Wang, Hua
    Li, Yongge
    Pei, Bin
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (10) : 3735 - 3744
  • [3] Image encryption process based on chaotic synchronization phenomena
    Volos, Ch. K.
    Kyprianidis, I. M.
    Stouboulos, I. N.
    [J]. SIGNAL PROCESSING, 2013, 93 (05) : 1328 - 1340
  • [4] Chaotic image encryption based on finite field bidirectional diffusion and steganography
    Liu, Xiang
    Ding, Dawei
    Yang, Zongli
    [J]. 2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, : 218 - 222
  • [5] Chaotic coyote optimization algorithm for image encryption and steganography
    Tong, Huawei
    Li, Tianyou
    Xu, Youyun
    Su, Xinzhong
    Qiao, Guopeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20861 - 20887
  • [6] Chaotic coyote optimization algorithm for image encryption and steganography
    Huawei Tong
    Tianyou Li
    Youyun Xu
    Xinzhong Su
    Guopeng Qiao
    [J]. Multimedia Tools and Applications, 2024, 83 : 20861 - 20887
  • [7] Outsourcing chaotic selective image encryption to the cloud with steganography
    Xiang, Tao
    Hu, Jia
    Sun, Jianglin
    [J]. DIGITAL SIGNAL PROCESSING, 2015, 43 : 28 - 37
  • [8] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    [J]. 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [9] An image encryption algorithm based on generalized synchronization chaotic systems
    School of Information and Engineering, Beijing University of Science and Technology, Beijing 100083, China
    不详
    不详
    [J]. Jisuanji Gongcheng, 2006, 6 (154-156):
  • [10] Breaking an Image Encryption Scheme Based on Chaotic Synchronization Phenomenon
    Singh, Sushmita
    Ahmad, Musheer
    Malik, Dhruv
    [J]. 2016 NINTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2016, : 146 - 149