Proposition of new secure data communication technique based on Huffman coding, chaos and LSB

被引:0
作者
Bouguessa, Abdelkader [1 ]
Said, Naima Hadj
Pacha, Adda Ali
机构
[1] USTO Univ, Coding Lab, Oran, Algeria
关键词
compression; cryptography; steganography; Huffman; chaos; least significant bit; LSB; IMAGE ENCRYPTION;
D O I
10.1504/IJBM.2021.114644
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the number of internet users grow, finding robust and secure data communication is becoming increasingly popular today. This issue has led to the creation of hybrid security mechanisms. There are several methods in the literature that use various methods of encryption and steganography with certain advantages and disadvantages. This work provides a new hybrid security mechanism that tries to integrate the theory of chaos as cryptography mechanism, with LSB steganography technique. Huffman coding has also been used to increase the ability to integrate the proposed mechanism. Another new thing in this work is that we use a specific presentation to send plaintext data inside a picture. Our proposals are tested in MATLAB. To examine the effectiveness of the proposed technology, three types of analysis are performed: security, robustness and efficiency analysis. Modelling and results show that the proposed method is beating other methods in the literature.
引用
收藏
页码:343 / 365
页数:23
相关论文
共 34 条
[1]   An Introduction to Image Steganography Techniques [J].
Altaay, Alaa A. Jabbar ;
bin Sahib, Shahrin ;
Zamani, Mazdak .
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, :122-126
[2]   New approach to chaotic encryption [J].
Alvarez, E ;
Fernández, A ;
García, P ;
Jiménez, J ;
Marcano, A .
PHYSICS LETTERS A, 1999, 263 (4-6) :373-375
[3]  
[Anonymous], 2012, INT J COMPUTER APPL
[4]  
[Anonymous], 2014, INT J COMPUTER ELECT
[5]  
[Anonymous], 2012, INT J COMPUTER SCI I
[6]  
[Anonymous], 2012, INT J ENG TRENDS TEC
[7]  
[Anonymous], 2006, DIGITAL COMMUNICATIO
[8]  
Awrejcewicz J., 2012, BIFURCATION CHAOS TH
[9]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[10]   Enhancing Steganography in digital images [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
PROCEEDINGS OF THE FIFTH CANADIAN CONFERENCE ON COMPUTER AND ROBOT VISION, 2008, :326-332