Chaos based Zero-steganography algorithm

被引:27
作者
Bilal, Muhammad [1 ]
Imtiaz, Sana [1 ]
Abdul, Wadood [2 ]
Ghouzali, Sanaa [3 ]
Asif, Shahzad [4 ]
机构
[1] COMSATS Inst Informat Technol, Dept Elect Engn, Islamabad, Pakistan
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh, Saudi Arabia
[3] King Saud Univ, Dept Informat Technol, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[4] Ctr Adv Studies Engn, Dept Elect & Comp Engn, Islamabad, Pakistan
关键词
Steganography; Steganalysis; Zero-steganography; Imperceptiblity; Chaos based steganography; IMAGES;
D O I
10.1007/s11042-013-1415-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. Zero-steg-anography is an imperceptible and undetectable data hiding technique as no change is made to the cover, hence not requiring any steganalysis. The proposed algorithm hides the payload based on certain relationship between the cover image, chaotic sequence and the payload, instead of directly embedding payload into the cover image which often leaves tell tale signs of steganography. Moreover, use of chaotic map in the process of data hiding provides improved security. Survivability of the proposed algorithm is analyzed against JPEG compression, noise and low-pass filtering attacks. Imperceptibility analysis reveals that the proposed algorithm is totally imperceptible regardless of the payload length. The proposed algorithm is also analyzed for security and is found to be secure, in highly compromised scenarios, where all except one of the key components required to retrieve payload are known to the adversary.
引用
收藏
页码:1073 / 1092
页数:20
相关论文
共 42 条
[1]   LIST DECODING OF REED SOLOMON CODES FOR WAVELET BASED COLOUR IMAGE WATERMARKING SCHEME [J].
Abdul, Wadood ;
Carre, Philippe ;
Gaborit, Philippe .
2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, :3637-+
[2]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[3]  
[Anonymous], P SPIE
[4]  
[Anonymous], 2001, Information hiding, DOI 10.1007/3-540-
[5]  
[Anonymous], ELECT ENG
[6]  
[Anonymous], STEGANOGRAPHY HIDING
[7]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[8]  
Bose R. C., 1960, Information and control, DOI DOI 10.1016/S0019-9958(60)90287-4
[9]  
Chandramouli R, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P1019, DOI 10.1109/ICIP.2001.958299
[10]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752