Skip to main content

Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 336))

Abstract

In this study, we propose a complete system which uses both image hiding and image encryption techniques followed by decryption in order to meet the requirements of a secure image transfer. Chaos based cryptographic algorithms are efficient ways to develop secure image encryption techniques as they have many important properties, such as the sensitivity dependence on initial conditions and system parameters, pseudorandom property, non-periodicity and topological transitivity. Thus in our study we have developed the image encryption algorithm based on the chaotic logistic map and cat map. For this, a secret key is used to determine initial conditions and the input to the chaotic map function. The Lorenz map is then used for successive pixel encryption. Also, to make the cipher more robust against any attack, the secret key is modified after encrypting each pixel of the image using Arnold’s cat map. The encrypted image is then hidden using a steganography technique that uses a cover image along with the Lorenz map to determine the location of the pixels to be hidden in the cover. Decryption follows the exact inverse of the above mentioned technique. The image is first encrypted and then hidden with two stages of encryption to the key in order to provide additional security. The results of security and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  2. Zhang, X., Fan, J., Li, C.: New image evaluation method and its application. J. China Univer. Posts Telecommun. 18(Suppl 1), 1–5 (2011)

    MathSciNet  Google Scholar 

  3. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons Fractals 21, 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  4. Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75–82 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  5. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29, 393–399 (2006)

    Article  MATH  Google Scholar 

  6. Koochaksaraei, R.H., Aghazarian, V., Haroonabadi, A., Hedayati, A.: A novel data hiding method by using chaotic map and histogram. Int. J. Innov. Manage. Technol. 3(5) (2012)

    Google Scholar 

  7. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)

    Article  Google Scholar 

  8. Tataru, R.L., Battikh, D., El Assad, S., Noura, H., Deforges, O.: Enhanced adaptive data hiding in spatial LSB domain by using chaotic sequences. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2012)

    Google Scholar 

  9. Ahadpour, S.: A chaos-based image encryption scheme using chaotic coupled map lattices. Int. J. Comput. Appl. 49(2) (2012)

    Google Scholar 

  10. Sankaran, K.S., Krishna, B.V.S.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2) (2011)

    Google Scholar 

  11. Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101–1108 (2012)

    Article  Google Scholar 

  12. Dong, C.: Color image encryption using one-time keys and coupled chaotic systems. Sig. Process. Image Commun. 29(5), 628–640 (2014)

    Article  Google Scholar 

  13. Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error measurement to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)

    Article  Google Scholar 

  14. El-Emam, N.N., Al-Zubidy, R.A.S.: New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)

    Google Scholar 

  15. Lin, P.-Y., Chan, C.-S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010)

    Article  MathSciNet  Google Scholar 

  16. Ioannidou, A., Halkidis, S.T., Stephanides, G.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14), 11517–11524 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjukta Krishnagopal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Krishnagopal, S., Pratap, S., Prakash, B. (2015). Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2220-0_6

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2219-4

  • Online ISBN: 978-81-322-2220-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics