Skip to main content
Log in

A chaos based image steganographic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a steganographic technique using the theory of Brownian motion. In the beginning, the Brownian Based Scrambling procedure introduces traces of non linearity in the carrier medium so as to introduce one layer of security. A lighter pixel (in terms of its intensity) is presumed to experience a faster movement than the heavier ones. The above stated concept is based on the randomized scrambling strategy which is usually chaotic in nature. It actually reflects the strategy of chaos generation in the image medium. The ‘key’ is generated from the Brownian theories and is being utilized in the Power Modulus Scrambling strategy to increase the security level. In addition, the embedding technique, i.e. Pixel Insertion Methodology is also dependent on certain correlation factors of Brownian motion. The performance has been worked out to establish the efficacy of the algorithm. This whole procedure supports high embedding capacity. The experimental results show that the proposed technique performs better or at least at par with respect to many of the existing steganographic techniques. The results have been tested against various benchmarks, as illustrated in the section of experimental results. This approach can be used to provide an additional layer of protection to any system that communicates important data/information through any kind of globally accessed medium. Moreover, this approach serves its purpose of providing seamless security between sender and receiver without producing any distortion in the images. This explicit concept may be used in cyber-security for prevention of unauthorized access of information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal and Image Processing (IJSIP) 1(3):196–204

    Google Scholar 

  2. Ahmad T, Abdullah M (2009) A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering 3:1

    Google Scholar 

  3. Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157

    Google Scholar 

  4. Aljuaid N, Gutub A (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. Proceedings of International conference on Advanced Engineering Technologies (AET). Dubai UAE, pp 250–256

  5. Almohammad A, Ghinea G (2010) Stego-image quality and the reliability of PSNR. Image Processing Theory, Tools and Applications, IEEE, pp 215–210

  6. Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2017) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl, Springer:1–40

  7. Amitharanjan R, Rayappan J (2012) Brownian motion of binary and gray-binary and gray bits in image for stego. J Appl Sci 12:428–439

    Article  Google Scholar 

  8. Banerjee I, Indu P, Singh A et al (2015) Robust watermarking using four bit per pixel technique. Int J Electron Secur Digit Forensics 7:345–357

    Article  Google Scholar 

  9. Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76:16529–16562

    Article  Google Scholar 

  10. Bhattacharyya S, Sanyal G (2012) Study and analysis of quality of service in different image based steganography using pixel mapping method. International Journal of Applied Information Systems 2:42–57

    Google Scholar 

  11. Chandramouli R, Kharrazi M, Memon N (2003) Image steganography and steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM (eds) IWDW. Springer, pp 35–49

  12. Dukkipati A (2012) On maximum entropy and minimum KL-divergence optimization by Gröbner Basis methods. Appl Math Comput 218:11674–11687

    MathSciNet  MATH  Google Scholar 

  13. Duncan K, Sarkar S (2012) Relational entropy-based saliency detection in images and videos. 19th IEEE International Conference on Image Processing, pp 1093–1096

  14. El-Emam N (2015) New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. Comput Secur 55:21–45

    Article  MathSciNet  Google Scholar 

  15. Feng J, Zhang J, Zhu X et al (2017) A novel chaos optimization algorithm. Multimed Tools Appl 76:17405–17436

    Article  Google Scholar 

  16. Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. In: Astola J, Egiazarian KO (eds) Proc. SPIE 7532, image processing: algorithms and systems VIII

  17. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for RGB image based steganography. The 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA), SHARJAH, U.A.E

  18. Gutub A, Al-Q ahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. IEEE/ACS international conference on computer systems and applications, Rabat, Morocco, pp 400–403

  19. Hansen B (2015) The integrated mean squared error of series regression and a rosenthal hilbert-space inequality. Economet Theor 31:337–361

    Article  MathSciNet  Google Scholar 

  20. Jin L, Xinyi H, Jingwei L, Xiaofeng C, Yang X (2014) securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  21. Jin L, Jingwei L, Xiaofeng C, Chunfu J, Wenjing L (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  Google Scholar 

  22. Jin L, Yan KL, Xiaofeng C, Patrick PCL, Wenjing L (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  23. Kanan H, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130

    Article  Google Scholar 

  24. Kekre H, Patil K (2009) Standard deviation of mean and variance of rows and columns of images for CBIR. World Acad Sci Eng Technol 27:609–612

    Google Scholar 

  25. Khan F, Gutub A (2008) Message concealment techniques using image based steganography. The 4th IEEE GCC Conference and Exhibition, Gulf International Convention Centre, Manamah, Bahrain

  26. Koo H, Cho N (2013) Skew estimation of natural images based on a salient line detector. J Electron Imaging 22

    Article  Google Scholar 

  27. Lee M, Mitra R, Yap W et al (2017) Data privacy preserving scheme using generalised linear models. Comput Secur 69:142–154

    Article  Google Scholar 

  28. Liu L, Miao S (2017) An image encryption algorithm based on baker map with varying parameter. Multimed Tools Appl 76:16511–16527

    Article  Google Scholar 

  29. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214

    Article  Google Scholar 

  30. Malik F (2011) Mean and standard deviation features of color histogram using laplacian filter for content-based image retrieval. J Theor Appl Inf Technol 34

  31. Muhammad K, Ahmad J, Farman H et al (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans Internet Inf Syst 9:1938–1962

    Google Scholar 

  32. Muhammad K, Ahmad J, Rho S, Baik S (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76:18985–19004

    Article  Google Scholar 

  33. Mukherjee S, Sanyal G (2015) A novel image steganographic technique using position power first mapping (PPFM). IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp 406–410

  34. Mukherjee S, Sanyal G (2017) Enhanced position power first mapping (PPFM) based image steganography. International Journal of Computers and Applications (IJCA), Taylor and Francis 39:59–68

    Article  Google Scholar 

  35. Mukherjee S, Ash S, Sanyal G (2015) A novel image steganographic methodology by power modulus scrambling with logistic mapping. TENCON(IEEE Region 10 Conference)

  36. Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76:16107–16123

    Article  Google Scholar 

  37. Panjabi P, Singh P (2013) An Enhanced Data Hiding Approach Using Pixel Mapping Method With Optimal Substitution Approach. International Journal of Computer Applications 74:36–43

    Google Scholar 

  38. Parvez MT, Gutub AA (2009) RGB intensity based variable-bits image steganography. IEEE Asia-Pacific Services Computing Conference (APSCC), Yilan, Taiwan, pp 1322–1327

  39. Parvez M, Gutub A (2010) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering (KJSE) 38:127–142

    Google Scholar 

  40. Ping L, Jin L, Zhengan H, Tong L, Chong-Zhi G, Siu-Ming Y, Kai C (2017) Multi-key privacy-preserving deep learning in cloud computing. Futur Gener Comput Syst 74:76–85

    Article  Google Scholar 

  41. Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. CoRRabs

  42. Shen S, Huang L (2014) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131–141

    Article  Google Scholar 

  43. Singh AK, Kumar B, Singh SK et al (2017) Editorial note: robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications, Springer 76:3469–3469

    Article  Google Scholar 

  44. Solemani S, Taherinia A (2017) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76:20847–20867

    Article  Google Scholar 

  45. Wang Z, Bovik A, Sheik H et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  46. Xiaofeng C, Xinyi H, Jin L, Jianfeng M, Wenjing L, Duncan SW (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78

    Article  Google Scholar 

  47. Yang C, Weng C, Wang S et al (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3:488–497

    Article  Google Scholar 

  48. Yu C, Li J, Li X et al (2017) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  49. Yueping W, Zhi’an Y (2013) Research on image intensity based on Matlab. In: Du Z (ed) Intelligence computation and evolutionary computation. Advances in intelligent systems and computing, vol 180. Springer, Berlin, pp 101–107

    Chapter  Google Scholar 

  50. Zhengan H, Shengli L, Xianping M, Kefei C, Jin L (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412-413:223–241

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srilekha Mukherjee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee, S., Sanyal, G. A chaos based image steganographic system. Multimed Tools Appl 77, 27851–27876 (2018). https://doi.org/10.1007/s11042-018-5996-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5996-3

Keywords

Navigation