Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map

被引:14
|
作者
Walia, Gurjit Singh [1 ]
Makhija, Shikhar [2 ]
Singh, Kunwar [2 ]
Sharma, Kapil [3 ]
机构
[1] Def Res & Dev Org, Minist Def, Sci Anal Grp, New Delhi, India
[2] Univ Delhi, Netaji Subhas Inst Technol, Dept Elect & Commun, New Delhi, India
[3] Delhi Technol Univ, Dept Informat Technol, Delhi, India
来源
OPTIK | 2018年 / 170卷
关键词
High capacity; Steganography; Image data hiding; Image scanning; SIGNIFICANT-BIT SUBSTITUTION; STEGANOGRAPHIC METHOD; GENETIC ALGORITHM; IMAGE QUALITY; CAPACITY; STRATEGY; BLOCK;
D O I
10.1016/j.ijleo.2018.04.135
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
High capacity image steganography using Least Significant Bit (LSB) substitution greatly impaires visual quality of the stego image. In addition, most of steganographic schemes consider direct embedding of secret message without considering its security concern over public channel transmission. To address this problem, we have introduced a novel stego-key directed LSB substitution scheme which not only offers high embedding capacity but also resilient against stego image distortion. The aim of this work is to consider this problem as search and optimization. High embedding capacity is achieved through optimal utilization of search domain using proposed LUDO scan scheme. Optimal Stego-key is determined through cuckoo search optimization where Le'vy flight is used for obtaining new Stego-key. In addition, secret message is encrypted before embedding using chaotic map generated through random key. Large key space of Stego-key offer high resistance against various crypt analytic attacks. Proposed steganography scheme is evaluated over nine standard test images and competitive results are obtained. On an average, we achieved a Peak Signal-to-Noise Ratio (PSNR) of 44.09 and Structural Similarity Matrix (SSIM) of 0.97. Results demonstrate that the proposed steganography scheme not only outperforms state-of-the-art high embedding steganography schemes but also offers high payload capabilities with immunity against visual degradation.
引用
收藏
页码:106 / 124
页数:19
相关论文
共 32 条
  • [21] An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN
    Erkan, Ugur
    Toktas, Abdurrahim
    Enginoglu, Serdar
    Akbacak, Enver
    Thanh, Dang N. H.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (05) : 7365 - 7391
  • [22] An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN
    Uğur Erkan
    Abdurrahim Toktas
    Serdar Enginoğlu
    Enver Akbacak
    Dang N. H. Thanh
    Multimedia Tools and Applications, 2022, 81 : 7365 - 7391
  • [23] Analysis and Improvement of ‘Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme’
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Wireless Personal Communications, 2015, 83 : 35 - 48
  • [24] Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks
    Cui, Jie
    Wang, Yali
    Zhang, Jing
    Xu, Yan
    Zhong, Hong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8914 - 8924
  • [25] An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
    Yu, Yicheng
    Taylor, Oliver
    Li, Rui
    Sunagawa, Baiho
    MATHEMATICS, 2021, 9 (08)
  • [26] Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Roy, Sandip
    Chatterjee, Santanu
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 527 - 537
  • [27] Secure image encryption scheme based on a new robust chaotic map and strong S-box
    Zhu, Shenli
    Deng, Xiaoheng
    Zhang, Wendong
    Zhu, Congxu
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2023, 207 : 322 - 346
  • [28] A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
    Dheerendra Mishra
    Jangirala Srinivas
    Sourav Mukhopadhyay
    Journal of Medical Systems, 2014, 38
  • [29] A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
    Mishra, Dheerendra
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [30] Chaotic map-based time-aware multi-keyword search scheme with designated server
    Zhou, Yousheng
    Xu, Guangxia
    Wang, Yong
    Wang, Xiaojun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (13): : 1851 - 1858