Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer

被引:0
|
作者
Al-Sharo, Yasser Mohammad [1 ]
机构
[1] Ajloun Natl Univ, Fac Informat Technol, Ajloun, Jordan
关键词
Security; steganography; chaotic map; encryption; network data; CLOUD; CHALLENGES; ALGORITHMS;
D O I
10.14569/ijacsa.2019.0100430
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main aim of this study is to enhance the security level of the online data transfer using two integrated methods; images steganography to hide the transfer data in image media, and chaotic map to remap the original format of the transfer data. The integration between these two methods is effective to secure the data in several format such as text, audio, and images. The proposed algorithm is the prototyped using JAVA programming, 20 images and text messages of usable sizes (plain data) were tested on the dataset using the developed programming. The simulation using local server is accomplished to analyze the security performance based on two factors; the plain data size and the data transfer distance. Many attacking attempts are performed on the simulation test using known attacking techniques such as observe the stego images quality. The experiment results show that about 85% of the attacking attempts fail to catch the stego images. 95% of the attacks fail in remap meaningful parts of the chaotic data. The results indicate the very good level of the propose security methods to secure the online transfer data. The contribution of this study is the effective integration between the steganography and chaotic map approaches to assure high security level of online data transfer.
引用
收藏
页码:252 / 258
页数:7
相关论文
共 26 条
  • [1] A Novel Technique for Image Steganography Using Nonlinear Chaotic Map
    Thenmozhi, S.
    Chandrasekaran, M.
    7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2013), 2013, : 307 - 311
  • [2] Chaotic Map Based Steganography of Gray Scale Images in Wavelet Domain
    Garg, Shalu
    Mathur, Monika
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 689 - 694
  • [3] Chaotic map based random image steganography using LSB technique
    Rajendran S.
    Doraipandian M.
    International Journal of Network Security, 2017, 19 (04) : 593 - 598
  • [4] A Novel Approach to Video Steganography using a 3D Chaotic Map
    Narayanan, Gurupungav
    Narayanan, Rishika
    Haneef, Nihal
    Chittaragi, Nagaratna B.
    Koolagudi, Shashidhar G.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 955 - 959
  • [5] A New Approach for Information Security using an Improved Steganography Technique
    Juneja, Mamta
    Sandhu, Parvinder Singh
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2013, 9 (03): : 405 - 424
  • [6] Combined image encryption and steganography technique for enhanced security using multiple chaotic maps*
    Aparna, H.
    Madhumitha, J.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 110
  • [7] Digital Images Security Technique Using Hénon and Piecewise Linear Chaotic Maps
    Hazzazi, Mohammad Mazyad
    Iqbal, Nadeem
    Ikram, Atif
    IEEE ACCESS, 2023, 11 : 106299 - 106314
  • [8] Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security
    Kumar, Sanjay
    Sharma, Deepmala
    NONLINEAR DYNAMICS, 2024, 112 (14) : 12537 - 12564
  • [9] A novel approach to improve multimedia security utilizing 3D mixed chaotic map
    Naseer, Yasir
    Shah, Dawood
    Shah, Tariq
    MICROPROCESSORS AND MICROSYSTEMS, 2019, 65 : 1 - 6
  • [10] An Efficient Reversible Data Hiding Technique In Encrypted Images Based On Chaotic Map
    Dileep, Alka
    Anusudha, K.
    Asad, Muhammed P. T.
    2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 539 - 543