Bifold-crypto-chaotic steganography for visual data security

被引:0
作者
Ahuja B. [1 ]
Doriya R. [1 ]
机构
[1] Department of Information Technology, National Institute of Technology-Raipur, Chhattisgarh, Raipur
关键词
Arnold map; Cryptography; Discrete wavelet transform; Encryption; Logistic map; Steganography;
D O I
10.1007/s41870-022-00861-9
中图分类号
学科分类号
摘要
As digital images hold sensitive information from a number of areas, such as human, medical, satellite and biometric, etc., they therefore require the utmost protection. These photos hold various vulnerability threats and in this era of cloud and virtualization, to protect data from hackers, we need an efficient way to safeguard data that would provide a hybrid type of algorithm to protect data from multiple types of hackers. The approach is innovative and safe in the sense that it has two-fold protections for the safety of a secret message or information. Secret message is encrypted twice with Arnold and Logistic maps prior to transmission. The approach effectively blends the two aspects of visual data security with the integration of a chaotic mechanism in such a manner that optimal security can be obtained. The aim is to conceal a message or plain text and at the same time protect it by encrypting hidden keys and by means of DWT and a chaotic phenomenon. Therefore, by integrating these two approaches, the new approach conceptualizes dual encryption. Numerous metric studies, such as PSNR, MSE, correlation coefficient and SSIM, have been carried out for validation purposes. The results demonstrate that the system performs well with various grayscale images and outperforms cryptography and steganography alone in terms of security and reliability. © 2022, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:637 / 648
页数:11
相关论文
共 27 条
[1]  
Mohamed N.A., El-Azeim M.A., Zaghloul A., El-Latif A.A.A., Image encryption scheme for secure digital images based on 3D cat map and Turing machine, In Proceedings of the 2015 7Th International Conference of Soft Computing and Pattern Recognition, Socpar, 2015, (2016)
[2]  
Neeta D., Snehal K., Jacobs D., Implementation of LSB steganography and its evaluation for various bits, In 2006 1St International Conference on Digital Information Management, ICDIM., (2006)
[3]  
Singh G., Shrivastava S., Singh A., Analytic survey on various techniques of image steganography, Int J Comput Appl, 132, (2015)
[4]  
Nevriyanto A., Sutarno S., Siswanti S.D., Erwin E., Image steganography using combine of discrete wavelet transform and singular value decomposition for more robustness and higher peak signal noise ratio, In Proceedings of 2018 International Conference on Electrical Engineering and Computer Science, ICECOS, 2018, (2019)
[5]  
Soni A., Jain J., Roshan R., Image steganography using discrete fractional Fourier transform, In 2013 International Conference on Intelligent Systems and Signal Processing, ISSP 2013, (2013)
[6]  
Baby D., Thomas J., Augustine G., George E., Michael N.R., A novel DWT based image securing method using steganography, Procedia Comput Sci, (2015)
[7]  
Nasrullah N., Sang J., Mateen M., Akbar M.A., Xiang H., Xia X., Reversible data hiding in compressed and encrypted images by using Kd-tree, Multimed Tools Appl, 78, (2019)
[8]  
Hu D., Wang L., Jiang W., Zheng S., Li B., A novel image steganography method via deep convolutional generative adversarial networks, IEEE Access, (2018)
[9]  
Duan X., Jia K., Li B., Guo D., Zhang E., Qin C., Reversible image steganography scheme based on a U-net structure, IEEE Access, (2019)
[10]  
Gaurav K., Ghanekar U., Image steganography based on Canny edge detection, dilation operator and hybrid coding, J Inf Secur Appl, (2018)