Steganography by using Logistic Map Function and Cellular Automata

A tradeoff between the hiding capacity of a cover image and the quality of a stego-image in steganographic schemes is inevitable. In this study a hybrid model of cellular automata and chaotic function is proposed for steganography. In this method, N-bits mask is used for choosing a pixel position in main image which is suitable for hiding one bit of secret data. This mask is generated in each stage by cellular automat and logistic map function. Using cellular automata and logistic map function cause more security and safety in proposed method. Studying the obtained results of the performed experiments, high resistance of the proposed method against brute-force and statistical invasions is obviously illustrated.

[1]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[2]  Tao Zhang,et al.  A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..

[3]  James Wiegold,et al.  CIPHER SYSTEMS: The Protection of Communications , 1983 .

[4]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[5]  Nien-Lin Hsueh,et al.  A lossless data hiding scheme based on three-pixel block differences , 2008, Pattern Recognit..

[6]  J. Schwartz,et al.  Theory of Self-Reproducing Automata , 1967 .

[7]  Rasul Enayatifar,et al.  Using the Chaotic Map in Image Steganography , 2009 .

[8]  Kendall Preston,et al.  Modern Cellular Automata: Theory and Applications , 2013 .

[9]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[10]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[11]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Chin-Chen Chang,et al.  Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..

[13]  John von Neumann,et al.  Theory Of Self Reproducing Automata , 1967 .

[14]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[15]  Kendall Preston,et al.  Modern Cellular Automata , 1984, Advanced Applications in Pattern Recognition.