A novel chaotic approach for information hiding in image

被引:15
作者
Farschi, Seyyed Mohammad Reza [1 ]
Farschi, H. [1 ]
机构
[1] Islamic Azad Univ, Mashhad Branch, Dept Artificial Intelligence, Mashhad, Iran
关键词
Chaos encryption; Image hiding technology; Secret key; Image processing; ENCRYPTION ALGORITHM; STEGANOGRAPHY;
D O I
10.1007/s11071-012-0367-5
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Hiding information in image has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence. This work investigates current state-of-the-art methods and provides a new and efficient approach to digital image steganography. We proposed an asymmetric image steganographic method based on a chaotic dynamic system. The hidden message can be recovered using orbits different from the embedding orbits, and the original image is not required to extract the hidden message. In the real communication, the receiver can use the same system as well as retrieving the data back that has been hidden inside the image. However, a secret key is needed by the receiver in order to retrieve the data back. This secret key is generated to use the proposed algorithm during the process of hiding the data. In contrast to current method, by using the secret key to retrieve the data, it maintains privacy, confidentiality, and accuracy of the data. The experimental results on USC data base demonstrates that the proposed encryption algorithm has a low time complexity and has the advantages of large key space and high security. In addition, the discussions reveal that the proposed scheme possesses security, imperceptibility, and survivability. The results are promising and point to the advocacy and coherence of the developed algorithm.
引用
收藏
页码:1525 / 1539
页数:15
相关论文
共 32 条
[1]  
Ashtiyani M., 2008, P IEEE 3 INT C INF C, P7
[2]  
Avadhani P.S., 2010, ICIW C CHIN
[3]  
Bailey K, 2006, MULTIMED TOOLS APPL, V30, P55, DOI 10.1007/s11042-006-0008-4
[4]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[6]  
Chang C.C., 2007, INF SCI, V177, P68
[7]   A new encryption algorithm for image cryptosystems [J].
Chang, CC ;
Hwang, MS ;
Chen, TS .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) :83-91
[8]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[9]   A secure and improved self-embedding algorithm to combat digital document forgery [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2009, 89 (12) :2324-2332
[10]   Cryptanalysis of a chaos-based image encryption algorithm [J].
Cokal, Cahit ;
Solak, Ercan .
PHYSICS LETTERS A, 2009, 373 (15) :1357-1360