A steganographic method using Bernoulli's chaotic maps

A steganographic method for hiding information is proposed using four Bernoulli's chaotic maps.It is applied a two-step scheme: Pixel selection and masking of sensitive information.A module function is applied to the chaotic maps considering an iterated process.There is no evidence of periodicity in the sequences produced by the modified Bernoulli's maps.It is assumed that each map uses two 64-bits variables, and the key space has been estimated in 2508. Display Omitted This paper proposes an alternative for building a data hiding algorithm into digital images. The method is based on chaos theory and the least significant bit technique for embedding a secret message in a image. Specifically the Bernoulli's chaotic maps are used, to perform the following processes: (i) encrypt the bits of the message before embedding them into the cover image, (ii) a random selection of the image's compositions (R,G or B) must be performed and the insertion of the secret message in a random way to (iii) rows and (iv) columns of the image. Several experimental results are shown under different evaluation criteria, such as entropy, autocorrelation, homogeneity, contrast, energy, peak signal-to-noise ratio, mean squared error and maximum absolute squared deviation. Experimental results show a good improvement in the peak-signal-to-noise-ratio and Image Fidelity value of the proposed algorithm in comparison to the results obtained from similar algorithms.

[1]  A. A. Zaidan,et al.  New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .

[2]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[3]  Melad J. Saeed,et al.  A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE , 2013 .

[4]  Bhanu Kapoor,et al.  State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher , 2014 .

[5]  Jacob D. Frank One Dimensional Chaotic Dynamical Systems , 2005 .

[6]  Sirma Yavuz,et al.  Security problems for a pseudorandom sequence generator based on the Chen chaotic system , 2013, Comput. Phys. Commun..

[7]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[8]  Jessica J. Fridrich,et al.  Steganography using Gibbs random fields , 2010, MM&Sec '10.

[9]  Neha Aggarwal,et al.  Enhanced Least Significant Bit algorithm For Image Steganography , 2012 .

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  KokSheik Wong,et al.  Data embedding in random domain , 2015, Signal Process..

[12]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[13]  Kousik Dasgupta,et al.  A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain , 2014 .

[14]  R. Povinelli,et al.  Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .

[15]  George M. Joseph High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption , 2013 .

[16]  C. P. Sumathi,et al.  A Study of Various Steganographic Techniques Used for Information Hiding , 2014, ArXiv.

[17]  Manjot Bhatia,et al.  An Image Steganography Method Using Spread Spectrum Technique , 2014, SocProS.

[18]  Sakshi Pratap,et al.  Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection , 2014, SocProS.

[19]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[20]  S. Hemalatha,et al.  A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.