Chaotic system-based secure data hiding scheme with high embedding capacity

被引:8
作者
Yadav, Gyan Singh [1 ]
Ojha, Aparajita [1 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg Ja, Comp Sci & Engn, Jabalpur 482005, Madhya Pradesh, India
关键词
Steganographic method; Chaotic map; Data security; Imperceptibility; STEGANOGRAPHY; ALGORITHM; IMAGES;
D O I
10.1016/j.compeleceng.2018.02.022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, data hiding has emerged as one of the main research areas in digital security. There are plenty of schemes to hide the secret data into the least significant bit planes of an image. Most of them either traverse the image pixels according to the scanning methods or using some structural fixed patterns. Researchers have proposed data hiding techniques with an orientation of hiding the content of the information, but algorithms are known publicly. Hence, the secret data is prone to be revealed easily. To provide higher security, several methods have been proposed that determine data hiding locations using certain patterns/formula. Chaotic systems have also been effectively utilized to devise secret key based data hiding algorithms. This alleviates the problem of easy retrieval even if the embedding algorithm is known. The present paper proposes a chaotic system based data hiding scheme that provides high payload as well as imperceptibility. In addition, the scheme exhibits excellent performance in terms of data security. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:447 / 460
页数:14
相关论文
共 18 条
  • [1] A technique for digital steganography using chaotic maps
    Anees, Amir
    Siddiqui, Adil Masood
    Ahmed, Jameel
    Hussain, Iqtadar
    [J]. NONLINEAR DYNAMICS, 2014, 75 (04) : 807 - 816
  • [2] [Anonymous], OPTIK INT J LIGHT EL
  • [3] Bandyopadhyay D., 2014, Int J Secur Priv Trust Manage (IJSPTM), V3, P11, DOI [10.5121/ijsptm.2014.3102, DOI 10.5121/IJSPTM.2014.3102]
  • [4] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [5] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [6] Chi-Nan Lin, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P369, DOI 10.1109/IIH-MSP.2009.143
  • [7] Chin-Chen Chang, 2008, 2008 3rd International Conference on Innovative Computing Information and Control (ICICIC), DOI 10.1109/ICICIC.2008.149
  • [8] Secret image sharing with authentication-chaining and dynamic embedding
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) : 803 - 809
  • [9] A steganographic method using Bernoulli's chaotic maps
    Francisco Martinez-Gonzalez, Ricardo
    Alejandro Diaz-Mendez, Jose
    Palacios-Luengas, Leonardo
    Lopez-Hernandez, Juan
    Vazquez-Medina, Ruben
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2016, 54 : 435 - 449
  • [10] Detecting LSB steganography in color and gray-scale images
    Fridrich, J.
    Goljan, M.
    Du, R.
    [J]. IEEE Multimedia, 2001, 8 (04) : 22 - 28