A steganographic scheme for secure communications based on the chaos and euler Theorem

Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence. This work proposes an asymmetric image steganographic method based on a chaotic dynamic system and the Euler theorem. The hidden message can be recovered using orbits different from the embedding orbits, and the original image is not required to extract the hidden message. Experimental results and discussions reveal that the proposed scheme possesses security, imperceptibility and survivability.

[1]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[2]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[4]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[5]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[6]  F. Dyson,et al.  Period of a Discrete Cat Mapping , 1992 .

[7]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[8]  Man Young Rhee Cryptography and Secure Communications , 1993 .

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Garry Howell,et al.  An Introduction to Chaotic dynamical systems. 2nd Edition, by Robert L. Devaney , 1990 .

[13]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[14]  Der-Chyuan Lou,et al.  Adaptive Digital Watermarking Using Fuzzy Clustering Technique , 2001 .

[15]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[16]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[17]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[18]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[19]  Chin-Chen Chang,et al.  Fast exponentiation method obtained by folding the exponent in half , 1996 .

[20]  R. Devaney An Introduction to Chaotic Dynamical Systems , 1990 .

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..