A Dual Layer Secure Data Encryption and Hiding Scheme for Color Images Using the Three-Dimensional Chaotic Map and Lah Transformation

被引:11
作者
Alanazi, Ammar S. [1 ]
机构
[1] King Abdulaziz City Sci & Technol, Commun & Informat Technol Res Inst, Riyadh 11442, Saudi Arabia
关键词
Cryptography; Histograms; Encryption; Chaos; Transforms; Mathematical model; Licenses; Chaotic map; information hiding; Lah transformation; dual layer security;
D O I
10.1109/ACCESS.2021.3058112
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in the usage of multimedia content and transmission over the internet demands data securing techniques. In this work, a data encryption technique using a three-dimensional chaotic map and highly nonlinear substitution boxes for the encryption of secret images, followed by a data hiding scheme based on Lah transformation i-e the secret image is first encrypted and then hide in the cover image. For data hiding, integer's polynomial sequence is generated using addition and multiplication in coefficient form by evaluating pixels of images, secret bits of Lah transformed encrypted image are embedded in the LhTs coefficient of cover image partitioned into the cluster of four bits. To ensure minimum distortion coefficient adjustment is done before the embedding process. To obtain the stego image inverse Lah transformation is applied after the embedding process. The security analysis of the proposed dual layer data security scheme is performed, the result shows that the proposed system bearing strong immunity against various cryptographic attacks.
引用
收藏
页码:26583 / 26592
页数:10
相关论文
共 30 条
[1]   Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding [J].
Alanazi, Norah ;
Khan, Esam ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) :1403-1431
[2]   A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox [J].
Alghafis, Abdullah ;
Waseem, Hafiz Muhammad ;
Khan, Majid ;
Jamal, Sajjad Shaukat ;
Amin, Muhammad ;
Batool, Syeda Iram .
WIRELESS NETWORKS, 2024, 30 (07) :6217-6236
[3]   A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states [J].
Alghafis, Abdullah ;
Waseem, Hafiz Muhammad ;
Khan, Majid ;
Jamal, Sajjad Shaukat .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 554
[4]   An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System [J].
Alghafis, Abdullah ;
Munir, Noor ;
Khan, Majid ;
Hussain, Iqtadar .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) :1227-1240
[5]   A new construction of confusion component of block ciphers [J].
Ali, Khawaja Muhammad ;
Khan, Majid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) :32585-32604
[6]   A color image watermarking scheme based on affine transformation and S 4 permutation [J].
Batool, Syeda Iram ;
Shah, Tariq ;
Khan, Majid .
NEURAL COMPUTING & APPLICATIONS, 2014, 25 (7-8) :2037-2045
[7]   Effective reversible data hiding in encrypted image with adaptive encoding strategy [J].
Fu, Yujie ;
Kong, Ping ;
Yao, Heng ;
Tang, Zhenjun ;
Qin, Chuan .
INFORMATION SCIENCES, 2019, 494 :21-36
[8]   Reversible data hiding based on novel pairwise PVO and annular merging strategy [J].
Gao, Erdun ;
Pan, Zhibin ;
Gao, Xinyi .
INFORMATION SCIENCES, 2019, 505 :549-561
[9]  
Jamal S. S., 2013, NONLINEAR DYNAM, V3, P73
[10]   A robust steganographic technique based on improved chaoticrange systems [J].
Jamal, Sajjad Shaukat ;
Farwa, Shabieh ;
Alkhaldi, Ali H. ;
Aslam, Muhammad ;
Gondal, Mohammad Asif .
CHINESE JOURNAL OF PHYSICS, 2019, 61 :301-309