We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Efficient Steganography Scheme based on Logistic Map and DWT-SVD

by Hadis Tarrah, Sattar Mirzakuchaki
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 8
Year of Publication: 2017
Authors: Hadis Tarrah, Sattar Mirzakuchaki
10.5120/ijca2017913687

Hadis Tarrah, Sattar Mirzakuchaki . Efficient Steganography Scheme based on Logistic Map and DWT-SVD. International Journal of Computer Applications. 164, 8 ( Apr 2017), 8-11. DOI=10.5120/ijca2017913687

@article{ 10.5120/ijca2017913687,
author = { Hadis Tarrah, Sattar Mirzakuchaki },
title = { Efficient Steganography Scheme based on Logistic Map and DWT-SVD },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 8 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number8/27501-2017913687/ },
doi = { 10.5120/ijca2017913687 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:44.553557+05:30
%A Hadis Tarrah
%A Sattar Mirzakuchaki
%T Efficient Steganography Scheme based on Logistic Map and DWT-SVD
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 8
%P 8-11
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is one of the most powerful techniques to conceal the existence of hidden secret message inside a cover medium like image, video, audio, etc. An image is a suitable cover object for steganography because of its great amount of redundant spaces and its abundance. This paper represents a secure steganography scheme which incorporating discrete wavelet transform (DWT) and the stability of the singular values with logistic map-based encryption. In this proposed scheme first of all, the secret image has been encrypted using the logistic map. The encrypted image is added to singular value of original image after two-level DWT to form the stego-image. In this paper the Peak Signal to Noise Ratio (PSNR), correlation coefficient (CR) are used to evaluate the transparency and security of algorithm.

References
  1. Morkel, T., Eloff, J., and Olivier, MS., "An Overview of Image Steganography", Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA), Sandton, South Africa. June/July 2005
  2. Mahmoudpour, S., and Mirzakuchaki, S., "Hardware Architecture for a Message Hiding Algorithm with Novel Randomizers", International Journal of Computer Applications, Volume 37, No.7, 2012.
  3. Singh, P., Shivani, S. and Agarwal, S., "A Chaotic Map Based DCT-SVD Watermarking Scheme for Rightful Ownership Verification", IEEE, August 2014
  4. Nikolaidis, N. and Pitas, I., "Robust image watermarking in the spatial domain", Signal Processing, vol. 66, pp. 385-403, 1998.
  5. Prodilchuk, C., De1p, E. "Digital watermarking algorithms and applications", IEEE Signal Processing Magazine,2001, 69 (13):33-46
  6. Desheng, X., Yueshan, X., "Image watermarking algorithm based on DWT". Computer Engineering and Design, 2005, 26(3)611-613.
  7. Babya, D., Thomasa, J., Augustinea, G., Georgea, E., Michaela, N., “A Novel DWT based Image Securing Method using Steganography”, International Conference on Information and Communication Technologies (ICICT), 2014.
  8. Kushwah, N., Sharma, M., "Chaotic Map based Block Encryption", International Journal of Computer Applications, Volume 71– No.16, 2013
  9. Jahan, R., "Efficient and Secure Digital Image Watermarking Scheme using DWT-SVD and Optimized Genetic Algorithm based Chaotic Encryption", International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 10, October 2013
  10. Patidar, V., and Sud, K., “A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing”, Informatica 33, (2009), 441–452 441
  11. Lei, B., Ni, B., Chen, S., Wang, T., Zhou, F., “Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform”, Springer, Nonlinear Dyn (2014)
  12. Joseph, A., Anusudha, K., “Robust watermarking based on DWT SVD”, International Journal of Signal & Image Processing, Issue. 1, Vol. 1, October 2013
  13. Lai, C., Tsai, C., “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Transactions on Instrumentation and Measurement, vol. 59, No.11, pp. 3060-3063, Nov. 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography DWT SVD Chaotic map Logistic Map