Skip to main content

Implementation of Chaotic-Based Hybrid Method to Provide Double Layer Protection

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 710))

Abstract

In the modern era, Internet is the most widely used transmission medium. While transmitting any secret information through any public channel, then that may be hacked in between. So to send data to the receiver without any kind of damage, here we have proposed a hybrid method by using both the cryptography and steganography technique. The secret message is first encrypted by using chaotic neural network. For encrypting data, we used CNN because of its random nature which is very challenging for hackers to know about the secret information. The secret key decides the position to hide the encrypted data. Only authorized users share the secret key. The receiver finds the original message by using secret key and then decryption is performed. Our experiment shows that PSNR of our method is very high as the technique modifies lesser number of bits. This method provides good security and less distortion to original image.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheng-Hsing Yang And Shiuh-JengWang, “Transforming LSB Substitution for Image based Steganography in Matching Algorithms”, Journal Of Information Science And Engineering, 26, 1199–1212 (2010).

    Google Scholar 

  2. Abbas Cheddad, Condell, Kevin Curran, Paul McKevitt, F. Hartung, “Information hiding-a survey” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Volume: 87 Issue: 7, pp. I062–I078, July. 1999.

    Google Scholar 

  3. Jarno Mielikainen, “LSB matching revisited,” IEEE signal processing letters, vol. 13, no. 5, May 2006.

    Google Scholar 

  4. S. M. MasudKarim, Md. Saifur Rahman, Md. Ismail Hossain “A New Approach for LSB Based Image Steganography using Secret Key” Proceedings of 14th International Conference on Computer and Information Technology (ICCIT) 2011.

    Google Scholar 

  5. G. KarthigaiSeivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” International Conference on Computing, Electronics and Electrical Technologies [ICCEET] 2012, pp 1023–1027.

    Google Scholar 

  6. Qinhua Huang and Weimin Ouyang, “Protect Fragile Regions in Steganography LSB Embedding”, 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.

    Google Scholar 

  7. Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder “Chaos based Edge Adaptive Image Steganography” international Conference on Computational Intelligence (CIMTA), 2013, vol 10, pp. 138–146.

    Google Scholar 

  8. Rig Das, Themrichon Tuitthung, “A Novel Steganography Method For Image Based on Huffman Encoding”, IEEE, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shreela Dash .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dash, S., Das, M., Das, M. (2018). Implementation of Chaotic-Based Hybrid Method to Provide Double Layer Protection. In: Pattnaik, P., Rautaray, S., Das, H., Nayak, J. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 710. Springer, Singapore. https://doi.org/10.1007/978-981-10-7871-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7871-2_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7870-5

  • Online ISBN: 978-981-10-7871-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics