CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques

by V. Lokeswara Reddy, B. Sailendar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 11
Year of Publication: 2014
Authors: V. Lokeswara Reddy, B. Sailendar
10.5120/18247-9310

V. Lokeswara Reddy, B. Sailendar . Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques. International Journal of Computer Applications. 104, 11 ( October 2014), 18-23. DOI=10.5120/18247-9310

@article{ 10.5120/18247-9310,
author = { V. Lokeswara Reddy, B. Sailendar },
title = { Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 11 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number11/18247-9310/ },
doi = { 10.5120/18247-9310 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:54.102947+05:30
%A V. Lokeswara Reddy
%A B. Sailendar
%T Enhanced Chaos based Image Steganography using Edge Adaptive and Cat Mapping Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 11
%P 18-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the science of hiding the messages in a medium. The existence of hidden messages remains imperceptible to the Intruders. The medium used for hiding the messages may be audio, video, text or images. The important goal of steganography is to protect the hidden message. There are many techniques to hide the payload in images. This will be achieved by applying different techniques in any medium. There are many techniques applied by the intruders to find the hidden information those techniques are called anti-steganalysis techniques. To provide the security to the payload after inserting the payload in to messages we need to do the anti steganalysis, if the hidden information is found then we need to provide the additional security. There is a need to build the system with highest security levels so that the anti steganalysis techniques can't find out the hidden information. In the proposed system there are certain areas which are suitable for hiding the payload are called Edges. Edges are good Regions of Interest or ROIs that are used for steganography. The proposed system uses edge adaptive image steganography [1] that uses the combinations of chaotic cat mapping [2] to provide additional security and matrix encoding [3] and LSBM [4] to embed the data in to image. The proposed mechanism guaranties the high imperceptibility and Fidelity which are the two important requirements for any Image steganography.

References
  1. John Canny, "A computational approach to edge detection", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 8, No. 6, pp. 679–698, Nov. 1986.
  2. Zhu Liehuang, Li Wenzhuo, Liao Lejian , Li Hong, "A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping", International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 601-605, 2006.
  3. Ron Crandall, "Some Notes on Steganography", Posted on Steganography Mailing List, 1998. Source: http://www. dia. unisa. it/~ads/corsosecurity/ www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding. pdf
  4. Weiqi Luo, Fangjun Huang, Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010, pp. 201-214.
  5. Grant Kelly, Bruce McKenzie, "Security, privacy and confidentiality issues on the internet", Source: http://www. ncbi. nlm. nih. gov/pmc/articles/PMC1761937.
  6. C. V. Serdean, M. Tomlinson, J. Wade, A. M. Ambroze, "Protecting Intellectual Rights: Digital Watermarking in the wavelet domain", IEEE Int. Workshop Trends and Recent Achievements in IT, pp. 16-18, 2002.
  7. Ratnakirti Roya,*, Anirban Sarkara, Suvamoy Changdera, "Chaos based Edge Adaptive Image Steganography", International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013
  8. G. Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan, "Steganography using Edge Adaptive Image", Proc. of the International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1023 1027, 2012.
  9. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang , Hung-Min Sun, "Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems", IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, September 2008, pp. 488-497.
  10. Qian-chuan Zhong, Qing-xin Zhu , Ping-Li Zhang , "A Spatial Domain Color Watermarking Scheme based on Chaos", International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 137-142, 2008.
  11. X. Li, B. Yang, D. Cheng, and T. Zeng, "A generalization of lsb matching", IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Payload Chaotic cat mapping Matrix Encoding LSB Matching Regions of Interests (ROI) Edge Detection Image Steganography