Steganography applied in the origin claim of pictures captured by drones based on chaos

被引:5
作者
Jimenez-Rodriguez, Maricela [1 ]
Padilla-Leyferman, Carlos E. [2 ]
Estrada-Gutierrez, Juan C. [2 ]
Gonzalez-Novoa, Maria G. [2 ]
Gomez-Rodriguez, Horacio [2 ]
Flores-Siordia, Octavio [2 ]
机构
[1] Univ Guadalajara, Dept Technol Sci, Guadalajara, Jalisco, Mexico
[2] Univ Guadalajara, Guadalajara, Jalisco, Mexico
来源
INGENIERIA E INVESTIGACION | 2018年 / 38卷 / 02期
关键词
Steganography; chaos; security; drones; ENCRYPTION; ALGORITHM;
D O I
10.15446/ing.investig.v38n2.64509
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar.Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers.
引用
收藏
页码:61 / 69
页数:9
相关论文
共 21 条
[1]   A technique for digital steganography using chaotic maps [J].
Anees, Amir ;
Siddiqui, Adil Masood ;
Ahmed, Jameel ;
Hussain, Iqtadar .
NONLINEAR DYNAMICS, 2014, 75 (04) :807-816
[2]  
[Anonymous], THESIS
[3]  
[Anonymous], REGULA SCT USO AERON
[4]  
[Anonymous], REV POLITECNICA
[5]  
[Anonymous], NUEVO ALGORITMO CRIP
[6]  
[Anonymous], INFORM SECURITY J GL
[7]   A cycling chaos-based cryptic-free algorithm for image steganography [J].
Aziz, Mahdi ;
Tayarani-N, Mohammad H. ;
Afsar, Mehdi .
NONLINEAR DYNAMICS, 2015, 80 (03) :1271-1290
[8]   Onion steganography: a novel layering approach [J].
Baig, Faisal ;
Khan, Muhammad Fahad ;
Beg, Saira ;
Shah, Tariq ;
Saleem, Khalid .
NONLINEAR DYNAMICS, 2016, 84 (03) :1431-1446
[9]  
Barbara E, 2012, ING INVEST, V32, P46
[10]   A steganographic method using Bernoulli's chaotic maps [J].
Francisco Martinez-Gonzalez, Ricardo ;
Alejandro Diaz-Mendez, Jose ;
Palacios-Luengas, Leonardo ;
Lopez-Hernandez, Juan ;
Vazquez-Medina, Ruben .
COMPUTERS & ELECTRICAL ENGINEERING, 2016, 54 :435-449