Image steganography based on a new hybrid chaos map and discrete transforms

被引:20
作者
Sharafi, J. [1 ]
Khedmati, Y. [2 ]
Shabani, M. M. [1 ]
机构
[1] Imam Ali Univ, Fac Sci, Tehran, Iran
[2] Univ Mohaghegh Ardabili, Dept Math, Ardebil 5619911367, Iran
来源
OPTIK | 2021年 / 226卷
关键词
Steganography; Image; Chaotic system; Framelet; Wavelet; WAVELET TRANSFORM; ENCRYPTION; ALGORITHM; SYSTEM;
D O I
10.1016/j.ijleo.2020.165492
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
With the development of Internet networks, the importance of information security is becoming more and more significant. Therefore, it is considered necessary to study the existing methods in order to develop them for creating more suitable approaches. Due to the fact that, in the most communication networks image is one of the most popular and widely used communication formats, the method presented in this paper is the image steganography method in transform domain. In order to enhance the image transfer, first of all, we have introduced a hybrid chaotic map based on the sine and Logistic-Tent systems by applying radical function and a variety of trigonometric functions. Furthermore, we have represented some new kinds of shift operators for shuffling pixel positions of the cover image in order to improve resistance of the algorithm against different kinds of attacks. In the proposed algorithms, we have also applied discrete framelet and wavelet transforms on secret and cover images, respectively. To show the ability of the proposed algorithm, the results have been evaluated.
引用
收藏
页数:22
相关论文
共 47 条
[1]   An imperceptible spatial domain color image watermarking scheme [J].
Abraham, Jobin ;
Paul, Varghese .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (01) :125-133
[2]  
[Anonymous], 2012, IEEE T INF FORENSICS, DOI DOI 10.1109/TIFS.2011.2175919
[3]  
[Anonymous], 1998, J UNDERGRAD MATH
[4]   Steganalysis using image quality metrics [J].
Avcibas, I ;
Memon, N ;
Sankur, B .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :221-229
[5]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[6]  
Bracewell R. N., 1986, The Fourier Transform and its Applications
[7]   A framelet-based image inpainting algorithm [J].
Cai, Jian-Feng ;
Chan, Raymond H. ;
Shen, Zuowei .
APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 2008, 24 (02) :131-149
[8]   An image encryption algorithm based on chaotic system and compressive sensing [J].
Chai, Xiuli ;
Zheng, Xiaoyu ;
Gan, Zhihua ;
Han, Daojun ;
Chen, Yiran .
SIGNAL PROCESSING, 2018, 148 :124-144
[9]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[10]   JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images [J].
Chen, Mo ;
Sedighi, Vahid ;
Boroumand, Mehdi ;
Fridrich, Jessica .
IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, :75-84