Substitution steganography with security improved by chaotic image encryption

This article describes an information hiding scheme, which combines advantages of steganography and cryptography. After brief review of currently used techniques and their properties, a chaotic image encryption method based on quadratic map is proposed. This algorithm is then utilized as a tool for encryption of image representing secret data, which is afterwards embedded into cover image by means of LSB matching. Paper also provides verification of results achieved by both parts of presented approach and discusses its advantages and drawbacks.

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  J. Rogers Chaos , 1876 .

[3]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[4]  Simon Singh,et al.  The Code Book , 1999 .

[5]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[6]  A. Pietrikova,et al.  Image processing of die attach's X-ray images for automatic voids detection and evaluation , 2016, 2016 39th International Spring Seminar on Electronics Technology (ISSE).

[7]  N. Sloane,et al.  Some doubly exponential sequences , 1973 .

[8]  Jessica J. Fridrich,et al.  Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.

[9]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[10]  Dusan Levicky,et al.  A novel JPEG steganography method based on modulus function with histogram analysis , 2012 .

[11]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[12]  Valerie Novitzká,et al.  Categorical model of structural operational semantics for imperative language , 2016 .

[13]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Mircea Vladutiu,et al.  Secret data communication system using steganography, AES and RSA , 2011, 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME).

[15]  Ondrej Kovac,et al.  Image steganography with using QR code and cryptography , 2016, 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).

[16]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[17]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[18]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[19]  Harsh K. Verma,et al.  A hybrid approach for image security by combining encryption and steganography , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[20]  Simone Bacellar Leal Ferreira,et al.  AES cryptography in color image steganography by genetic algorithms , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[21]  Andreja Samÿcovic,et al.  ATTACKS ON DIGITAL WAVELET IMAGE WATERMARKS , 2008 .

[22]  William Steingartner,et al.  Some properties of coalgebras and their role in computer science , 2016 .