Skip to main content

A Hybrid Image Steganography Using Chaotic Maps in DCT Domain

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1053))

  • 1190 Accesses

Abstract

In this paper, a robust image steganography approach is proposed using chaotic maps and discrete cosine transform (DCT). The energy compaction property of DCT and deterministic pseudorandom characteristics of chaotic map are exploited to develop novel hybrid image steganography in DCT domain. The proposed technique applies DCT on the original image, and two logistic maps (LM) are used to identify the random locations (row and column, respectively) for secret data embedding. Whereas sine map (SM) embeds the secret information in the cover media according to different initial and control parameters. The experimental results demonstrate that the proposed method has high embedding capacity (EC), excellent stego-image quality and capability to withstand against brute attacks. Proposed method outperforms the existing steganography techniques in terms of EC, peak signal to noise ratio (PSNR), and universal image quality index (Q), and bit error rate (BER).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)

    Article  Google Scholar 

  2. Maurya, I., Gupta, S.K.: Secure image steganography through pre-processing. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds.) Soft Computing: Theories and Applications 2017, AISC, vol. 742. Springer, Singapore (2019)

    Google Scholar 

  3. Pandey, A., Saini, B.S., Singh, B., Sood, N.: An integrated approach using chaotic map and sample value difference method for electrocardiogram and OFDM based secured patient information transmission. J. Med. Syst. 41, 187 (2017)

    Article  Google Scholar 

  4. Singh, A.K., Dave, M., Mohan, A.: Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl. Acad. Sci. Lett. 37(4), 351–358 (2014)

    Google Scholar 

  5. Hussain, M., Abdul Wahab, A.W., Ho, A.T.S., Javed, N., Jung, K.H.: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Sig. Process. Image Commun. 50, 44–57 (2017)

    Article  Google Scholar 

  6. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  Google Scholar 

  7. Chen, J.: A PVD-based data hiding method with histogram preserving using pixel pair matching. Sig. Process. Image Commun. 29(3), 375–384 (2014)

    Article  Google Scholar 

  8. Wu, H.C., Chao, R.M., Lee, C.C., Chu, Y.P.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur. 658047, 1–9 (2009)

    Google Scholar 

  9. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  10. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 24, 1613–1626 (2003)

    Google Scholar 

  11. Jafari, R., Ziou, D., Mehdi, M.: Increasing image compression rate using steganography. Expert Syst. Appl. 40(17), 6918–6927 (2013)

    Article  Google Scholar 

  12. Subhedar, M.S., Mankar, V.H.: Image steganography using redundant discrete wavelet transform and QR factorization. Comput. Electr. Eng. 54, 406–422 (2016)

    Article  Google Scholar 

  13. Lin, Y.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interfaces 36(5), 855–862 (2014)

    Article  Google Scholar 

  14. Joshi, M., Agarwal, A.K., Gupta, B.: Fractal image compression and its techniques: a review. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds.) Soft Computing: Theories and Applications 2017. AISC, vol. 742. Springer, Singapore (2019)

    Google Scholar 

  15. Rajpurohit, J., Kumar, T., Ajith, S.: Glossary of metaheuristic algorithms. Int. J. Comput. Inf. Syst. Ind. Manage. Appl. 9, 181–205 (2017)

    Google Scholar 

  16. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76(11), 13493–13510 (2017)

    Article  Google Scholar 

  17. Qin, C., Chang, C., Lin, C.: An adaptive reversible steganographic scheme based on the just noticeable distortion. Multimedia Tools Appl. 74(6), 1983–1995 (2013)

    Article  Google Scholar 

  18. Anees, A., Masood, A., Ahmed, J., Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75(4), 807–816 (2014)

    Article  Google Scholar 

  19. Ghebleh, M., Kanso, A., Noura, H.: An image encryption scheme based on irregularly decimated chaotic maps. Sig. Process. Image Commun. 29(5), 618–627 (2014)

    Article  Google Scholar 

  20. Valandar, M.Y., Ayubi, P., Barani, M.J.: A new transform domain steganography based on modified logistic chaotic map for color images. J. Inf. Secur. Appl. 34, 142–151 (2017)

    Google Scholar 

  21. Wang, Z., Member, S., Bovik, A.C.: A universal image quality index. IEEE Signal Process. Lett. 9(3), 81–84 (2002)

    Article  Google Scholar 

  22. Sun, W., Lu, Z.M., Wen, Y.C., Yu, F.X., Shen, R.J.: High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2), 297–306 (2013)

    Article  Google Scholar 

  23. Mao, Q., Li, F., Chang, C.: Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf. Sci. 317(100), 170–180 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Butta Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, R., Singh, B. (2020). A Hybrid Image Steganography Using Chaotic Maps in DCT Domain. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_60

Download citation

Publish with us

Policies and ethics