FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

In this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels.

[1]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[2]  Amir-Masoud Eftekhari-Moghadam,et al.  An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..

[3]  Tao Han,et al.  LSB steganographic payload location for JPEG-decompressed images , 2015, Digit. Signal Process..

[4]  Mark Owens March,et al.  A Discussion of Covert Channels and Steganography , 2002 .

[5]  Musheer Ahmad,et al.  A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2009 .

[6]  S. Lanzisera,et al.  Steganography in 802.15.4 wireless communication , 2008, 2008 2nd International Symposium on Advanced Networks and Telecommunication Systems.

[7]  Fathi E. Abd El-Samie,et al.  Performance of the audio signals transmission over wireless networks with the channel interleaving considerations , 2012, EURASIP J. Audio Speech Music. Process..

[8]  Yixian Yang,et al.  Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[9]  K. Chandrasekaran,et al.  New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length) , 2015 .

[10]  Nawal A. El-Fishawy,et al.  JPEG image transmission over mobile network with an efficient channel coding and interleaving , 2012 .

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  Fathi E. Abd El-Samie,et al.  Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering , 2016, Wireless Personal Communications.

[13]  George M. Joseph High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption , 2013 .

[14]  Malla Reddy,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image in painting , 2015 .

[15]  Sos S. Agaian,et al.  Quantifying image similarity using measure of enhancement by entropy , 2007, SPIE Defense + Commercial Sensing.

[16]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[17]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[18]  P. Nandakumar,et al.  A Triple-Key chaotic image encryption method , 2011, 2011 International Conference on Communications and Signal Processing.

[19]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[20]  Kaustubh Choudhary Image Steganography and Global Terrorism , 2012 .

[21]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[22]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[23]  Ali Kanso,et al.  A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..

[24]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[25]  M. A. M. El-Bendary,et al.  Enhancing Transmission over Wireless Image Sensor Networks Based on ZigBee Network , 2014 .

[26]  A H M Kamal Steganography: Securing Message in wireless network , 2013, BIOINFORMATICS 2013.

[27]  Sung Wook Baik,et al.  Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices , 2017, Multimedia Tools and Applications.

[28]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[29]  Vijay Kumar,et al.  User Priority Based Search on Organizing User Search Histories with Security , 2013 .

[30]  Fathi E. Abd El-Samie,et al.  Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels , 2016, Wirel. Pers. Commun..

[31]  Chin-Chen Chang,et al.  An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Fathi E. Abd El-Samie,et al.  An SVD audio watermarking approach using chaotic encrypted images , 2011, Digit. Signal Process..

[33]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[34]  S. Goel,et al.  Comparison of Image Steganography Techniques , 2013 .

[35]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[36]  Muhammad Khurram Khan,et al.  Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .

[37]  S. El-Rabaie,et al.  Chaotic Interleaving for Robust Image Transmission with LDPC Coded OFDM , 2014, Wirel. Pers. Commun..

[38]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[39]  Mohsen A M El-Bend Ary Developing Security Tools of WSN and WBAN Networks Applications , 2015 .

[40]  Qian Wang,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.