Abstract
In this study, we propose a complete system which uses both image hiding and image encryption techniques followed by decryption in order to meet the requirements of a secure image transfer. Chaos based cryptographic algorithms are efficient ways to develop secure image encryption techniques as they have many important properties, such as the sensitivity dependence on initial conditions and system parameters, pseudorandom property, non-periodicity and topological transitivity. Thus in our study we have developed the image encryption algorithm based on the chaotic logistic map and cat map. For this, a secret key is used to determine initial conditions and the input to the chaotic map function. The Lorenz map is then used for successive pixel encryption. Also, to make the cipher more robust against any attack, the secret key is modified after encrypting each pixel of the image using Arnold’s cat map. The encrypted image is then hidden using a steganography technique that uses a cover image along with the Lorenz map to determine the location of the pixels to be hidden in the cover. Decryption follows the exact inverse of the above mentioned technique. The image is first encrypted and then hidden with two stages of encryption to the key in order to provide additional security. The results of security and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)
Zhang, X., Fan, J., Li, C.: New image evaluation method and its application. J. China Univer. Posts Telecommun. 18(Suppl 1), 1–5 (2011)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons Fractals 21, 749–761 (2004)
Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75–82 (2003)
Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29, 393–399 (2006)
Koochaksaraei, R.H., Aghazarian, V., Haroonabadi, A., Hedayati, A.: A novel data hiding method by using chaotic map and histogram. Int. J. Innov. Manage. Technol. 3(5) (2012)
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)
Tataru, R.L., Battikh, D., El Assad, S., Noura, H., Deforges, O.: Enhanced adaptive data hiding in spatial LSB domain by using chaotic sequences. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2012)
Ahadpour, S.: A chaos-based image encryption scheme using chaotic coupled map lattices. Int. J. Comput. Appl. 49(2) (2012)
Sankaran, K.S., Krishna, B.V.S.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2) (2011)
Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101–1108 (2012)
Dong, C.: Color image encryption using one-time keys and coupled chaotic systems. Sig. Process. Image Commun. 29(5), 628–640 (2014)
Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error measurement to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)
El-Emam, N.N., Al-Zubidy, R.A.S.: New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)
Lin, P.-Y., Chan, C.-S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010)
Ioannidou, A., Halkidis, S.T., Stephanides, G.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14), 11517–11524 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Krishnagopal, S., Pratap, S., Prakash, B. (2015). Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_6
Download citation
DOI: https://doi.org/10.1007/978-81-322-2220-0_6
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2219-4
Online ISBN: 978-81-322-2220-0
eBook Packages: EngineeringEngineering (R0)