A novel technique for image steganography using nonlinear chaotic map

Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. The beauty of steganography technology comes out in more pronounced way when there is no absolute relation between stego and original image and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be more random and non-predictable, they can be made utilized in achieving the encryption. The transposition technology of encryption systems requires scrambleness behaviour in order to achieve the encryption of the data. This srambleness behaviour can be derived from the randomness property of chaos which can be better utilized in the techniques like transposition system. Firstly the henon mapping (chaos) is applied on the secret image and the two dimensional Discrete Wavelet Transform (2-D DWT) is performed on the cover image of size M × N. Then each bit of scrambled image is embedded in the high frequency coefficients resulted from Discrete Wavelet Transform. Image quality is to be improved by preserving the wavelet coefficients in the low frequency subband. The experimental results show that the algorithm has a high capacity and a good invisibility. Furthermore, satisfactory security is maintained since the secret message/image cannot be extracted without knowing initial conditions of the henon map.

[1]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[2]  Li Chuanmu,et al.  A New Image Encryption Scheme based on Hyperchaotic Sequences , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[3]  Zhang Xin,et al.  Image encryption algorithm based on Henon chaotic system , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[4]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[5]  K. Deergha Rao,et al.  Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI Realization , 2007, 2007 15th International Conference on Digital Signal Processing.

[6]  V. Chandrasekaran,et al.  Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[7]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[10]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[11]  Henry Leung,et al.  Secure communication using a chaos based signal encryption scheme , 2001, IEEE Trans. Consumer Electron..

[12]  M. Usama,et al.  Classical and chaotic encryption techniques for the security of satellite images , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  C. K. Huang,et al.  Hybrid image encryption using multi-chaos-system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[15]  Tianjie Cao,et al.  Survey: Image Encryption using Chaotic Cryptography Schemes , 2011 .

[16]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[17]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..