Chaos Based Information Hiding and Security

Digital chaotic generators have been investigated for many decades. However, their performances in terms of the tradeoff between security and speed, as well as their use in many systems for secure information, has not been sufficiently addressed and demonstrated. We propose a very efficient digital chaotic generator and we demonstrate its capability to build robust and fast chaos based cryptosystems, and chaos based steganography systems. Also, the proposed chaotic generator, can be used to build efficient chaos based watermarking systems.

[1]  Ljupco Kocarev,et al.  Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[2]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[3]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[4]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[5]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[6]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[7]  Olivier Déforges,et al.  Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Karel Burda Error Propagation in Various Cipher Block Modes , 2006 .

[9]  D. R. Frey,et al.  Chaotic digital encoding: an approach to secure communication , 1993 .

[10]  I. Taralova,et al.  Design and Analyses of Efficient Chaotic Generators for Crypto-systems , 2008, Advances in Electrical and Electronics Engineering - IAENG Special Edition of the World Congress on Engineering and Computer Science 2008.

[11]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Anil Kumar,et al.  Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map , 2010, ICISTM.

[13]  Safwan El Assad,et al.  An efficient and secure SPN cryptosystem based on chaotic control parameters , 2011, 2011 International Conference for Internet Technology and Secured Transactions.