A novel chaotic approach for information hiding in image
 Seyyed Mohammad Reza Farschi,
 H. Farschi
 … show all 2 hide
Rent the article at a discount
Rent now* Final gross prices may vary according to local VAT.
Get AccessAbstract
Hiding information in image has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence. This work investigates current stateoftheart methods and provides a new and efficient approach to digital image steganography. We proposed an asymmetric image steganographic method based on a chaotic dynamic system. The hidden message can be recovered using orbits different from the embedding orbits, and the original image is not required to extract the hidden message. In the real communication, the receiver can use the same system as well as retrieving the data back that has been hidden inside the image. However, a secret key is needed by the receiver in order to retrieve the data back. This secret key is generated to use the proposed algorithm during the process of hiding the data. In contrast to current method, by using the secret key to retrieve the data, it maintains privacy, confidentiality, and accuracy of the data. The experimental results on USC data base demonstrates that the proposed encryption algorithm has a low time complexity and has the advantages of large key space and high security. In addition, the discussions reveal that the proposed scheme possesses security, imperceptibility, and survivability. The results are promising and point to the advocacy and coherence of the developed algorithm.
 Wang, X., Wang, X., Zhao, J., Zhang, Z. (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63: pp. 587597 CrossRef
 Chang, C.C., Hwang, M.S., Chen, T.S. (2001) A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58: pp. 8391 CrossRef
 Mao, Y.B., Chen, G., Lian, S.G. (2004) A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurc. Chaos 14: pp. 36133624 CrossRef
 Cheddad, A., Condell, J., Curran, K., McKevitt, P. (2009) A secure and improved selfembedding algorithm to combat digital document for gery. Signal Process. 89: pp. 2332
 Cheddad, A., Condell, J., Curran, K., McKevitt, P. (2010) Digital image steganography: survey and analysis of current methods. Signal Process. 90: pp. 727752 CrossRef
 Liu, H., Wang, X. (2011) Color image encryption using spatial bitlevel permutation and highdimension chaotic system. Opt. Commun. 284: pp. 38953903 CrossRef
 Shannon, C.E. (1949) Communication theory of secrecy systems. Bell Syst. Tech. J. 28: pp. 656715
 Johnson, N.F., Jajodia, S. (1998) Exploring steganography: seeing the unseen. IEEE. Comput. J. 31: pp. 2634 CrossRef
 Tirkel, A.Z., Schyndel, R.G., Osborn, D.F. (1994) A twodimensional digital watermark. Int. Conf. on Image Processing. pp. 8690
 Koch, E., Zhao, J. (1995) Towards robust and hidden image copyright labeling. Proc. of IEEE Workshop on Nonlinear Signal and Image Processing. pp. 452455
 Gruhl, D., Bender, W., Morimoto, M. (1996) Techniques for data hiding. IBM Syst. J. 35: pp. 1635
 Davern, P., Scott, M. (1996) Fractal based image steganography. Information Hiding, First International Workshop. Springer, Berlin, pp. 279294 CrossRef
 Fridrich, J. (1998) Symmetric ciphers based on twodimensional chaotic maps. Int. J. Bifurc. Chaos 8: pp. 12591284 CrossRef
 Kocarev, L. (2001) Chaosbased cryptography: a brief overview. IEEE Circuits Syst. Mag. 1: pp. 621 CrossRef
 Wang, X.Y., Yang, L., Liu, R., Kadir, A. (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62: pp. 615621 CrossRef
 Ashtiyani, M., Birgani, P.M., Hosseini, H.M. (2008) Chaosbased medical image encryption using symmetric cryptography. Proceedings of IEEE 3rd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2008). pp. 711
 Bailey, K., Curran, K. (2006) An evaluation of image based steganography methods. Multimed. Tools Appl. 30: pp. 5588 CrossRef
 Beşdok, E. (2005) Hiding information in multispectral spatial images. AEÜ, Int. J. Electron. Commun. 59: pp. 1524 CrossRef
 Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L. (2007) Reversible hiding in DCTbased compressed images. Inf. Sci. 177: pp. 6886
 Cokal, C., Solak, E. (2009) Cryptanalysis of a chaosbased image encryption algorithm. Phys. Lett. A 373: pp. 13571360 CrossRef
 Denis, T.S. (2006) Cryptography for Developers. Syngress, Waltham
 Kocarev, L., Halle, K.S., Eckert, K., Chua, L.O. (1992) Experimental demonstration of secure communication via chaotic synchronization. Int. J. Bifurc. Chaos 2: pp. 709713
 Fridrich, J., Goljan, M., Soukal, D. (2005) Perturbed quantization steganography. Multimed. Secur. J. 11: pp. 98107 CrossRef
 Gao, T., Chen, Z. (2008) A new image encryption algorithm based on hyperchaos. Phys. Lett. A 372: pp. 394400 CrossRef
 Dedieu, H., Kennedy, M.P., Hasler, M. (1993) Chaos shiftkeying: Modulation and demodulation of a chaotic character using self synchronizing Chua’s circuits. IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process. 40: pp. 634642 CrossRef
 Dyson, F.J., Falk, H. (1992) Period of a discrete cat mapping. Am. J. Math. 99: pp. 603624
 Liu, H., Wang, X. (2010) Color image encryption based on onetime keys and robust chaotic maps. Comput. Math. Appl. 59: pp. 33203327 CrossRef
 Avadhani, P.S., Lalitha Bhaskari, D. (2010) A blind scheme watermarking algorithm for data hiding in RGB images using godelization technique under spatial domain. ICIW Conference.
 Rhee, M.Y. (1994) Cryptography and Secure Communications. McGrawHill, New York
 Konfelder, L.M. (1978) On the signature reblocking problem in publickey cryptosystem. Commun. ACM 21: pp. 156190
 Johnson, N., Jajodia, S. (1998) Steganalysis of images created using current steganography software. Proc. Second Workshop on Information Hiding. pp. 273289
 Bender, W., Gruhl, D., Morimoto, N., Lu, A. (1996) Techniques for data hiding. IBM Syst. J. 35: pp. 313336 CrossRef
 Wu, Y.T., Shih, F.Y. (2006) Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans. Syst. Man Cybern., Part B, Cybern. 36: pp. 2431 CrossRef
 Title
 A novel chaotic approach for information hiding in image
 Journal

Nonlinear Dynamics
Volume 69, Issue 4 , pp 15251539
 Cover Date
 20120901
 DOI
 10.1007/s1107101203675
 Print ISSN
 0924090X
 Online ISSN
 1573269X
 Publisher
 Springer Netherlands
 Additional Links
 Topics
 Keywords

 Chaos encryption
 Image hiding technology
 Secret key
 Image processing
 Industry Sectors
 Authors

 Seyyed Mohammad Reza Farschi ^{(1)}
 H. Farschi ^{(1)}
 Author Affiliations

 1. Department of Artificial Intelligence, Mashhad Branch, Islamic Azad University, Mashhad, Iran