Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps

by Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 12
Year of Publication: 2016
Authors: Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy
10.5120/ijca2016909037

Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy . Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps. International Journal of Computer Applications. 138, 12 ( March 2016), 1-6. DOI=10.5120/ijca2016909037

@article{ 10.5120/ijca2016909037,
author = { Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy },
title = { Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 12 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number12/24428-2016909037/ },
doi = { 10.5120/ijca2016909037 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:27.681127+05:30
%A Mervat Mikhail
%A Yasmine Abouelseoud
%A Galal Elkobrosy
%T Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 12
%P 1-6
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a new approach for secure hiding of textual data in a colored digital image. Use of images as a cover media in steganography is based on the deficiencies in the human visual system (HVS). The proposed technique employs two independent chaotic sequences for specifying the locations where the message bits are embedded in the cover image using an adapted version of the least significant bit (LSB) method. Message bits are embedded using the 3-3-2 LSB insertion method for the chaotically selected pixels of the cover image. This technique provides sufficient security as the same sequence of numbers cannot be generated without knowing the exact key; that is; the initial conditions of the two chaotic maps used in the index selection process. Moreover, the preliminary results ensure that eavesdroppers will not have any suspicion that there is a message hidden within the sent image since the peak signal to noise ratio (PSNR) is high and the mean-squared-error (MSE) is low. Furthermore, the length of the secret message is another important component of the key, which standard steganography detection methods cannot estimate correctly. Finally, the proposed approach provides better PSNR values and MSE values compared to other existing techniques as apparent from our experimental results.

References
  1. Dey, S., Abraham, A., Sanyal, S. (2007, August). An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on (pp. 101-108). IEEE.
  2. Yu, L., Zhao, Y., Ni, R., Li, T. (2010). Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP Journal on Advances in Signal Processing, 2010, 32.
  3. Liao, X., Wen, Q. Y., Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.
  4. Kumar, A., Kumari, S., Patro, S., Sh, T., Acharya, A. K. Image Steganography using Index based Chaotic Mapping., IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT 2015(1):1-4, January 2015.
  5. Zaghbani, S., Rhouma, R. (2013, April). Data hiding in spatial domain image using chaotic map. In Modeling, Simulation and Applied Optimization (ICMSAO), 2013 5th International Conference on (pp. 1-5). IEEE.
  6. Anees, A., Siddiqui, A. M., Ahmed, J., Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
  7. Ghebleh, M., Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.
  8. Kanso, A. (2012). Steganographic algorithm based on a chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3287-3302.
  9. Juneja, M., Sandhu, P. S. (2013). An improved LSB based steganography technique for RGB color images. International Journal of Computer and Communication Engineering, 2(4), 513.
  10. Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22.
  11. Dasgupta, K., Mandal, J. K., Dutta, P. (2012). Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), 1-11.
  12. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
  13. Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4). The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at: http://sipi.usc.edu/database/, last accessed in November 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic Maps Cover image Histogram LSB method PSNR Stego-image Embedding Capacity