Abstract
In the modern era, Internet is the most widely used transmission medium. While transmitting any secret information through any public channel, then that may be hacked in between. So to send data to the receiver without any kind of damage, here we have proposed a hybrid method by using both the cryptography and steganography technique. The secret message is first encrypted by using chaotic neural network. For encrypting data, we used CNN because of its random nature which is very challenging for hackers to know about the secret information. The secret key decides the position to hide the encrypted data. Only authorized users share the secret key. The receiver finds the original message by using secret key and then decryption is performed. Our experiment shows that PSNR of our method is very high as the technique modifies lesser number of bits. This method provides good security and less distortion to original image.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cheng-Hsing Yang And Shiuh-JengWang, “Transforming LSB Substitution for Image based Steganography in Matching Algorithms”, Journal Of Information Science And Engineering, 26, 1199–1212 (2010).
Abbas Cheddad, Condell, Kevin Curran, Paul McKevitt, F. Hartung, “Information hiding-a survey” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Volume: 87 Issue: 7, pp. I062–I078, July. 1999.
Jarno Mielikainen, “LSB matching revisited,” IEEE signal processing letters, vol. 13, no. 5, May 2006.
S. M. MasudKarim, Md. Saifur Rahman, Md. Ismail Hossain “A New Approach for LSB Based Image Steganography using Secret Key” Proceedings of 14th International Conference on Computer and Information Technology (ICCIT) 2011.
G. KarthigaiSeivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” International Conference on Computing, Electronics and Electrical Technologies [ICCEET] 2012, pp 1023–1027.
Qinhua Huang and Weimin Ouyang, “Protect Fragile Regions in Steganography LSB Embedding”, 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.
Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder “Chaos based Edge Adaptive Image Steganography” international Conference on Computational Intelligence (CIMTA), 2013, vol 10, pp. 138–146.
Rig Das, Themrichon Tuitthung, “A Novel Steganography Method For Image Based on Huffman Encoding”, IEEE, 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dash, S., Das, M., Das, M. (2018). Implementation of Chaotic-Based Hybrid Method to Provide Double Layer Protection. In: Pattnaik, P., Rautaray, S., Das, H., Nayak, J. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 710. Springer, Singapore. https://doi.org/10.1007/978-981-10-7871-2_34
Download citation
DOI: https://doi.org/10.1007/978-981-10-7871-2_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7870-5
Online ISBN: 978-981-10-7871-2
eBook Packages: EngineeringEngineering (R0)