Efficient and secure data hiding in encrypted images: A new approach using chaos

ABSTRACT The recent trends in technology have made it possible to reproduce and share digital media more easily and more rapidly. This leads to the problem of exploiting the media illegitimately. To alleviate this problem, many cryptographic techniques are used to secure the data by encrypting them. However, the cloaked form of encrypted data attracts the intruder and shows the way to malicious attacks. Due to this, in recent times steganography has drawn more attention to secure the data. This article presents a new technique that embeds data in intermediate significant bit (ISB) and least significant bit (LSB) planes of the cover image. The method employs chaotic maps to generate random locations to hide the data bits as well as permutation order to encrypt the cover image. The cover image is first encrypted by applying permutation order, then embedding is carried out on the random locations generated. After embedding, the decrypted cover image is transmitted. This method provides two-level security in extracting the hidden data. Experimental outcomes (PSNR, MSE, NAE, and NCC) confirm that the method is proficient. The randomness of the values generated by chaotic maps is assessed by the NIST standard test suite.

[1]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[2]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[3]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[4]  Qiang Cheng,et al.  Multimedia watermarking , 2002 .

[5]  Sengül Dogan,et al.  A new data hiding method based on chaos embedded genetic algorithm for color image , 2016, Artificial Intelligence Review.

[6]  Kousik Dasgupta,et al.  A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain , 2014 .

[7]  Rajeev Kumar,et al.  A NEW CHAOTIC IMAGE ENCRYPTION USING PARAMETRIC SWITCHING BASED PERMUTATION AND DIFFUSION , 2014 .

[8]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[9]  K. Murali,et al.  Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.

[10]  Ki-Hyun Jung,et al.  Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.

[11]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[12]  Frank Bossen,et al.  Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.

[13]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[14]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[16]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[17]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[18]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[19]  Azizah Abdul Manaf,et al.  High watermarking capacity based on spatial domain technique , 2011 .

[20]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[21]  Saraju P. Mohanty,et al.  Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..

[22]  Javaid A. Sheikh,et al.  Data hiding in intermediate significant bit planes, a high capacity blind steganographic technique , 2012, 2012 International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET).

[23]  Ghada Th. Talee,et al.  A New Approach For Chaotic Encrypted Data Hiding In Color Image , 2014 .

[24]  Raoof Smko,et al.  Variable length encoding in multiple frequency domain steganography , 2010, 2010 2nd International Conference on Software Technology and Engineering.

[25]  Javaid A. Sheikh,et al.  Data hiding in scrambled images: A new double layer security data hiding technique , 2014, Comput. Electr. Eng..

[27]  Christos H. Skiadas,et al.  Chaos theory : modeling, simulation and applications : selected papers from the 3rd Chaotic Modeling and Simulation Conference (CHAOS2010), Chania, Crete, Greece, 1-4 June 2010 , 2011 .

[28]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[29]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[30]  S Pradeep,et al.  A NEW ONE ROUND IMAGE ENCRYPTION ALGORITHM BASED ON MULTIPLE CHAOTIC SYSTEMS , 2015 .

[31]  Melad J. Saeed,et al.  A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE , 2013 .

[32]  Trista Pei-chun Chen On the Study of Watermarking Application in WWW --- Modeling, Performance Analysis, and Applicati , 1999 .