Call for Paper - June 2019 Edition
IJCA solicits original research papers for the June 2019 Edition. Last date of manuscript submission is May 20, 2019. Read More

Image Steganography using Index based Chaotic Mapping

Print
PDF
IJCA Proceedings on International Conference on Distributed Computing and Internet Technology
© 2015 by IJCA Journal
ICDCIT 2015 - Number 1
Year of Publication: 2015
Authors:
Shreenandan Kumar
Suman Kumari
Sucheta Patro
Tushar Shandilya
Anuja Kumar Acharya

Shreenandan Kumar, Suman Kumari, Sucheta Patro Shandilya and Anuja Kumar Acharya. Article: Image Steganography using Index based Chaotic Mapping. IJCA Proceedings on International Conference on Distributed Computing and Internet Technology ICDCIT 2015(1):1-4, January 2015. Full text available. BibTeX

@article{key:article,
	author = {Shreenandan Kumar and Suman Kumari and Sucheta Patro andtushar Shandilya and Anuja Kumar Acharya},
	title = {Article: Image Steganography using Index based Chaotic Mapping},
	journal = {IJCA Proceedings on International Conference on Distributed Computing and Internet Technology},
	year = {2015},
	volume = {ICDCIT 2015},
	number = {1},
	pages = {1-4},
	month = {January},
	note = {Full text available}
}

Abstract

There have been many techniques for hiding messages in images in such a manner that the alterations made to the image are perceptually indiscernible. The Least-significant bit (LSB)-based approach is the most popular type of steganographic algorithm. However, we find that in most existing approaches the choice of embedding positions within the cover image are not secure enough. In this paper, we have used 1D chaotic logistic map to generate the pseudo random numbers; the index values of the sorted pseudo random numbers are the positions used to embed the message in the cover image. This technique provides sufficient security as the same set of numbers cannot be generated without knowing the exact key and thus the message is more secure. The proposed technique has been applied and tested successfully on various images producing significant results.

References

  • A. Tirkel , R. Schyndel and C. Os born, "A digital watermark", in Proc. IEEE Int. Conf. Image Processing. 1994, vol. 2, pp. 86-90.
  • R. Wolfgang and E. Delp, "A watermark for digital image", in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 3, pp. 219-222.
  • A. Daneshkhah, H. Aghaeinia, and S. H. Seyedi, "A more secure steganography method in spatial Domain," in Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on, pp. 189–194, IEEE, 2011.
  • R. -Z. Wang, C. -F. Lin, and J. -C. Lin, "Image hiding by optimal lsb substitution and genetical algorithm," Pattern recognition, vol. 34, no. 3, pp. 671–683, 2001.
  • R. Mersereau and F. Alturki, "Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation", in Proc. IEEE Int. Conf. on Image Processing, vol. 2,2001, pp. 542-545.
  • W. Sweldens y B. Yeo ,A. R. Calderbank, I. Daubechies, "Lossless ImageCompression Using Integer to Integer Wavelet Transforms", Proc. of Int. Conf. on Image Proc, 1997, pp. 596-599.
  • Anuja Kumar Acharya, 2011. Image encryption using new chaos based encryption algorithm. In International Conference on Communication, Computing & Security (ICCCS).
  • D. N. Naitik P Kamdar, Dipesh G. Kamdar, "Performance evaluation of lsb based steganography for Optimization of psnr and mse," Journal of information, knowledge and research in electronics and Communication engineering, vol. 2, no. 2, pp. 505–509.
  • N. S. Raghava1, Ashish Kumar, Aishwarya Deep and Abhilasha Chahal, "Improved LSB method for Image Steganography using H´enon Chaotic Map", open journal of information security and applications volume 1, number 1, june 2014.