Skip to main content

Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 336)

Abstract

In this study, we propose a complete system which uses both image hiding and image encryption techniques followed by decryption in order to meet the requirements of a secure image transfer. Chaos based cryptographic algorithms are efficient ways to develop secure image encryption techniques as they have many important properties, such as the sensitivity dependence on initial conditions and system parameters, pseudorandom property, non-periodicity and topological transitivity. Thus in our study we have developed the image encryption algorithm based on the chaotic logistic map and cat map. For this, a secret key is used to determine initial conditions and the input to the chaotic map function. The Lorenz map is then used for successive pixel encryption. Also, to make the cipher more robust against any attack, the secret key is modified after encrypting each pixel of the image using Arnold’s cat map. The encrypted image is then hidden using a steganography technique that uses a cover image along with the Lorenz map to determine the location of the pixels to be hidden in the cover. Decryption follows the exact inverse of the above mentioned technique. The image is first encrypted and then hidden with two stages of encryption to the key in order to provide additional security. The results of security and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

Keywords

  • Image steganography
  • Image encryption
  • Chaotic maps
  • Double layered key
  • Least significant bit (LSB)

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-81-322-2220-0_6
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-81-322-2220-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

References

  1. Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)

    CrossRef  MATH  MathSciNet  Google Scholar 

  2. Zhang, X., Fan, J., Li, C.: New image evaluation method and its application. J. China Univer. Posts Telecommun. 18(Suppl 1), 1–5 (2011)

    MathSciNet  Google Scholar 

  3. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons Fractals 21, 749–761 (2004)

    CrossRef  MATH  MathSciNet  Google Scholar 

  4. Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75–82 (2003)

    CrossRef  MATH  MathSciNet  Google Scholar 

  5. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29, 393–399 (2006)

    CrossRef  MATH  Google Scholar 

  6. Koochaksaraei, R.H., Aghazarian, V., Haroonabadi, A., Hedayati, A.: A novel data hiding method by using chaotic map and histogram. Int. J. Innov. Manage. Technol. 3(5) (2012)

    Google Scholar 

  7. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006)

    CrossRef  Google Scholar 

  8. Tataru, R.L., Battikh, D., El Assad, S., Noura, H., Deforges, O.: Enhanced adaptive data hiding in spatial LSB domain by using chaotic sequences. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2012)

    Google Scholar 

  9. Ahadpour, S.: A chaos-based image encryption scheme using chaotic coupled map lattices. Int. J. Comput. Appl. 49(2) (2012)

    Google Scholar 

  10. Sankaran, K.S., Krishna, B.V.S.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2) (2011)

    Google Scholar 

  11. Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101–1108 (2012)

    CrossRef  Google Scholar 

  12. Dong, C.: Color image encryption using one-time keys and coupled chaotic systems. Sig. Process. Image Commun. 29(5), 628–640 (2014)

    CrossRef  Google Scholar 

  13. Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error measurement to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)

    CrossRef  Google Scholar 

  14. El-Emam, N.N., Al-Zubidy, R.A.S.: New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)

    Google Scholar 

  15. Lin, P.-Y., Chan, C.-S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887–1893 (2010)

    CrossRef  MathSciNet  Google Scholar 

  16. Ioannidou, A., Halkidis, S.T., Stephanides, G.: A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14), 11517–11524 (2012)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjukta Krishnagopal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Krishnagopal, S., Pratap, S., Prakash, B. (2015). Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection. In: Das, K., Deep, K., Pant, M., Bansal, J., Nagar, A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2220-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2220-0_6

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2219-4

  • Online ISBN: 978-81-322-2220-0

  • eBook Packages: EngineeringEngineering (R0)