Abstract
Hiding information in image has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence. This work investigates current state-of-the-art methods and provides a new and efficient approach to digital image steganography. We proposed an asymmetric image steganographic method based on a chaotic dynamic system. The hidden message can be recovered using orbits different from the embedding orbits, and the original image is not required to extract the hidden message. In the real communication, the receiver can use the same system as well as retrieving the data back that has been hidden inside the image. However, a secret key is needed by the receiver in order to retrieve the data back. This secret key is generated to use the proposed algorithm during the process of hiding the data. In contrast to current method, by using the secret key to retrieve the data, it maintains privacy, confidentiality, and accuracy of the data. The experimental results on USC data base demonstrates that the proposed encryption algorithm has a low time complexity and has the advantages of large key space and high security. In addition, the discussions reveal that the proposed scheme possesses security, imperceptibility, and survivability. The results are promising and point to the advocacy and coherence of the developed algorithm.
Similar content being viewed by others
References
Wang, X., Wang, X., Zhao, J., Zhang, Z.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63(4), 587–597 (2011). doi:10.1007/s11071-010-9821-4
Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58, 83–91 (2001)
Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurc. Chaos 14, 3613–3624 (2004)
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: A secure and improved self-embedding algorithm to combat digital document for gery. Signal Process. 89(12), 23–32 (2009)
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)
Liu, H., Wang, X.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284, 3895–3903 (2011)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE. Comput. J. 31(2), 26–34 (1998)
Tirkel, A.Z., Van Schyndel, R.G., Osborn, D.F.: A two-dimensional digital watermark. In: Int. Conf. on Image Processing, Brisbane, Australia, vol. 2, pp. 86–90 (1994)
Koch, E., Zhao, J.: Towards robust and hidden image copyright labeling. In: Proc. of IEEE Workshop on Nonlinear Signal and Image Processing, New York, pp. 452–455 (1995)
Gruhl, D., Bender, W., Morimoto, M.: Techniques for data hiding. IBM Syst. J. 35(4), 16–35 (1996)
Davern, P., Scott, M.: Fractal based image steganography. In: Information Hiding, First International Workshop. Lecture Notes in Computer Science, pp. 279–294. Springer, Berlin (1996)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259–1284 (1998)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Wang, X.-Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)
Ashtiyani, M., Birgani, P.M., Hosseini, H.M.: Chaos-based medical image encryption using symmetric cryptography. In: Proceedings of IEEE 3rd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2008), Damascus, Syria, pp. 7–11 (2008)
Bailey, K., Curran, K.: An evaluation of image based steganography methods. Multimed. Tools Appl. 30(1), 55–88 (2006)
Beşdok, E.: Hiding information in multispectral spatial images. AEÜ, Int. J. Electron. Commun. 59(1), 15–24 (2005)
Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13), 68–86 (2007)
Cokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Phys. Lett. A 373(15), 1357–1360 (2009)
Denis, T.S.: Cryptography for Developers. Syngress, Waltham (2006)
Kocarev, L., Halle, K.S., Eckert, K., Chua, L.O.: Experimental demonstration of secure communication via chaotic synchronization. Int. J. Bifurc. Chaos 2(1), 709–713 (1992)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography. Multimed. Secur. J. 11(2), 98–107 (2005)
Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)
Dedieu, H., Kennedy, M.P., Hasler, M.: Chaos shift-keying: Modulation and demodulation of a chaotic character using self synchronizing Chua’s circuits. IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process. 40, 634–642 (1993)
Dyson, F.J., Falk, H.: Period of a discrete cat mapping. Am. J. Math. 99(2), 603–624 (1992)
Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)
Avadhani, P.S., Lalitha Bhaskari, D.: A blind scheme watermarking algorithm for data hiding in RGB images using godelization technique under spatial domain. In: ICIW Conference, China (2010)
Rhee, M.Y.: Cryptography and Secure Communications. McGraw-Hill, New York (1994)
Konfelder, L.M.: On the signature reblocking problem in public-key cryptosystem. Commun. ACM 21(2), 156–190 (1978)
Johnson, N., Jajodia, S.: Steganalysis of images created using current steganography software. In: Proc. Second Workshop on Information Hiding, Portland, pp. 273–289 (1998)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(5), 313–336 (1996)
Wu, Y.T., Shih, F.Y.: Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans. Syst. Man Cybern., Part B, Cybern. 36(1), 24–31 (2006)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Farschi, S.M.R., Farschi, H. A novel chaotic approach for information hiding in image. Nonlinear Dyn 69, 1525–1539 (2012). https://doi.org/10.1007/s11071-012-0367-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-012-0367-5