A new transform domain steganography based on modified logistic chaotic map for color images

Abstract The art and science of hiding information by embedding messages in various type of digital media is called steganography. This method performs by replacing bits of multimedia files (such as graphics, sounds and texts) with bits of secret message. The information that embeds in the cover media can be plain text, cipher text and even images. Steganography sometimes is used when encryption is not permitted or more commonly, steganography is supplement for encryption. By using steganography, if the encrypted file is deciphered, the encrypted file may still hide information. This paper is proposed a new transform domain steganography method based on integer wavelet transform (IWT) for digital images and also it used a chaotic map. This map is a modified logistic map which it increases the key length and security of proposed method. Experimental results shows that the proposed method has high capability in hiding information in any images which used as a cover media. Visual quality of image after embedding process is desirable due to Peak Signal-to-Noise Ratio (PSNR) measures. Also the NIST, DIEHARD and ENT tests suite show the proposed chaotic map randomness and sensitivity to smallest changes.

[1]  Sanaa Ghouzali,et al.  Chaos based Zero-steganography algorithm , 2013, Multimedia Tools and Applications.

[2]  Ying Zeng,et al.  Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Mohammad Shahram Moin,et al.  A novel image steganography scheme based on morphological associative memory and permutation schema , 2015, Secur. Commun. Networks.

[4]  Rose Qingyang Hu,et al.  Optimal multiuser spread-spectrum data hiding in digital images , 2015, Secur. Commun. Networks.

[5]  S. Hemalatha,et al.  A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.

[6]  Gandharba Swain,et al.  A Novel Approach to RGB Channel Based Image Steganography Technique , 2012, Int. Arab. J. e Technol..

[7]  Abid Yahya,et al.  Secured and robust information hiding scheme , 2013 .

[8]  Zahid Anwar,et al.  A survey on reversible watermarking techniques for relational databases , 2015, Secur. Commun. Networks.

[9]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[10]  Ju H. Park,et al.  Exponential synchronization for fractional-order chaotic systems with mixed uncertainties , 2015, Complex..

[11]  Jeong-A Lee,et al.  Adaptive least significant bit matching revisited with the help of error images , 2015, Secur. Commun. Networks.

[12]  Long Huang,et al.  Parameters estimation, mixed synchronization, and antisynchronization in chaotic systems , 2014, Complex..

[13]  Ming Li,et al.  Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.

[14]  A. Kanso,et al.  Steganographic algorithm based on a chaotic map , 2012 .

[15]  Ali Kanso,et al.  A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..

[16]  Pachiyappan Arulmozhivarman,et al.  RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour , 2015, Secur. Commun. Networks.

[17]  Hala S. Own,et al.  A blind chaos-based watermarking technique , 2014, Secur. Commun. Networks.

[18]  Ki-Hyun Jung,et al.  Steganographic method based on interpolation and LSB substitution of digital images , 2014, Multimedia Tools and Applications.

[19]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[20]  Der-Chyuan Lou,et al.  LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..

[21]  Xinpeng Zhang,et al.  Digital image steganalysis based on local textural features and double dimensionality reduction , 2016, Secur. Commun. Networks.

[22]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[23]  Ankur Saxena,et al.  DCT/DST-Based Transform Coding for Intra Prediction in Image/Video Coding , 2013, IEEE Transactions on Image Processing.

[24]  Putra Sumari,et al.  Steganography in digital images: Common approaches and tools , 2013 .

[25]  Pei-Ling Chiu,et al.  Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.

[26]  K. R. Venugopal,et al.  Robust image adaptive steganography using integer wavelets , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[27]  Nasrin M. Makbol,et al.  Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition , 2013 .

[28]  Gautam Sanyal,et al.  A Robust Image Steganography using DWT Difference Modulation (DWTDM) , 2012 .

[29]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[30]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[31]  Ralph R. Martin,et al.  Structure Aware Visual Cryptography , 2014, Comput. Graph. Forum.

[32]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[33]  Chin-Chen Chang,et al.  Reversible data hiding exploiting high-correlation regulation for high-quality images , 2015, Secur. Commun. Networks.

[34]  Swaminathan Ramakrishnan,et al.  Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission , 2014, Journal of Medical Systems.

[35]  Chin-Chen Chang,et al.  Reversible data hiding for high quality images exploiting interpolation and direction order mechanism , 2013, Digit. Signal Process..

[36]  Mohammad Mehdi Rashidi,et al.  Increasing image compression rate using steganography , 2013, Expert Syst. Appl..