Image steganography algorithm based on cascaded chaotic map and low bits embedding

被引:0
|
作者
Mu Jun [1 ]
机构
[1] Dian Xi Sci & Technol Normal Univ, Sch Informat Sci & Engn, Lincang 677000, Peoples R China
关键词
chaotic map; image steganography; low bits embedding;
D O I
10.3788/YJYXS20203504.0374
中图分类号
O7 [晶体学];
学科分类号
0702 ; 070205 ; 0703 ; 080501 ;
摘要
In order to ensure the security of some digital images with important value in untrusted channels, an image steganography algorithm based on cascaded chaotic map and low-bits embedding is proposed. The algorithm has a permutation-confusion-low bits embedding structure. In the permutation step, a novel chaotic map is firstly designed by cascade of two chaotic maps and used to generate a highly random sequence of random numbers, and then the random number sequence is used for scrambling digital images. In the confusion step, the confusion of the pixel values in the scrambling image is achieved by the XOR operation of the randomly selected cover image and the scrambling image. Finally, in the low bits embedding step, the image generated by the confusion step is split into four sub-images and embedded in the lowest two bits of the cover image. In the test of several chaotic map performance indicators, the cascaded chaotic map proposed in this paper is excellent. In the image security and performance analysis experiments, the image steganography algorithm proposed in this paper also shows high security and high execution efficiency.
引用
收藏
页码:374 / 382
页数:9
相关论文
共 19 条
  • [1] Geodesic stability, Lyapunov exponents, and quasinormal modes
    Cardoso, Vitor
    Miranda, Alex S.
    Berti, Emanuele
    Witek, Helvi
    Zanchin, Vilson T.
    [J]. PHYSICAL REVIEW D, 2009, 79 (06):
  • [2] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [3] [陈嘉勇 Chen Jiayong], 2012, [电子与信息学报, Journal of Electronics & Information Technology], V34, P1721
  • [4] Symmetric ciphers based on two-dimensional chaotic maps
    Fridrich, J
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
  • [5] A novel hash function based fragile watermarking method for image integrity
    Gul, Ertugrul
    Ozturk, Serkan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 17701 - 17718
  • [6] Huang X. S, 2006, E CHINA JIAOTONG U, V23, P82
  • [7] A novel image encryption algorithm based on a 3D chaotic map
    Kanso, A.
    Ghebleh, M.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) : 2943 - 2959
  • [8] KEKRE H B, 2015, INTELLIGENT SYSTEMS
  • [9] Data compression and encryption using cellular automata transforms
    Lafe, O
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 1997, 10 (06) : 581 - 591
  • [10] [雷正桥 Lei Zhengqiao], 2015, [计算机科学, Computer Science], V42, P162