A technique for digital steganography using chaotic maps

作者: Amir Anees , Adil Masood Siddiqui , Jameel Ahmed , Iqtadar Hussain

DOI: 10.1007/S11071-013-1105-3

关键词:

摘要: Chaos has been applied extensively in secure communication over the last decade, but most of chaotic security protocols defined, are cryptographically weak or slow to compute. Also, study phenomena as application area is not discussed detail. In this paper, we have intensely studied chaos, their influence communications and proposed a steganography technique spatial domain for digital images based upon maps. By applying chaos effectively communication, strength overall anticipated algorithm increased significant level. addition, few statistical analyses such correlation, entropy, energy, contrast, homogeneity, peak signal noise ratio, mean square error also carried out shown that it can survive against various differential attacks known message attack, cover stego only attack.

参考文章(14)
J C Judge, Steganography: Past, Present, Future Office of Scientific and Technical Information (OSTI). ,(2001) , 10.2172/15006450
Haojiang Gao, Yisheng Zhang, Shuyun Liang, Dequn Li, A new chaotic algorithm for image encryption Chaos, Solitons & Fractals. ,vol. 29, pp. 393- 399 ,(2006) , 10.1016/J.CHAOS.2005.08.110
Robert M. May, Simple mathematical models with very complicated dynamics Nature. ,vol. 261, pp. 459- 467 ,(1976) , 10.1038/261459A0
N. Provos, P. Honeyman, Hide and seek: an introduction to steganography ieee symposium on security and privacy. ,vol. 1, pp. 32- 44 ,(2003) , 10.1109/MSECP.2003.1203220
P. Moulin, R. Koetter, Data-Hiding Codes Proceedings of the IEEE. ,vol. 93, pp. 2083- 2126 ,(2005) , 10.1109/JPROC.2005.859599
S.B. Sadkhan, Cryptography : current status and future trends international conference on information and communication technologies. pp. 417- 418 ,(2004) , 10.1109/ICTTA.2004.1307809
Tao Yang, Chai Wah Wu, L.O. Chua, Cryptography based on chaotic systems IEEE Transactions on Circuits and Systems I-regular Papers. ,vol. 44, pp. 469- 472 ,(1997) , 10.1109/81.572346
Sushil Jajodia, Neil F. Johnson, Exploring steganography: Seeing the unseen IEEE Computer. ,vol. 31, pp. 26- 34 ,(1998) , 10.1109/MC.1998.10029