We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A New Approach For Chaotic Encrypted Data Hiding In Color Image

by Ghada Th. Talee, Melad J. Jelmeran, Saja J. Mohammad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 8
Year of Publication: 2014
Authors: Ghada Th. Talee, Melad J. Jelmeran, Saja J. Mohammad
10.5120/15006-3233

Ghada Th. Talee, Melad J. Jelmeran, Saja J. Mohammad . A New Approach For Chaotic Encrypted Data Hiding In Color Image. International Journal of Computer Applications. 86, 8 ( January 2014), 23-26. DOI=10.5120/15006-3233

@article{ 10.5120/15006-3233,
author = { Ghada Th. Talee, Melad J. Jelmeran, Saja J. Mohammad },
title = { A New Approach For Chaotic Encrypted Data Hiding In Color Image },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 8 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number8/15006-3233/ },
doi = { 10.5120/15006-3233 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:41.763145+05:30
%A Ghada Th. Talee
%A Melad J. Jelmeran
%A Saja J. Mohammad
%T A New Approach For Chaotic Encrypted Data Hiding In Color Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 8
%P 23-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sending encrypted messages frequently will draw the attention of third parties, i. e. crackers and hackers, perhaps causing attempts and revealing the original messages. In digital world, Steganography is introduced to hide the existence of the communication by concealing encryption message inside color image. This paper proposed a steganography algorithm that hides encrypted text in color image by using chaotic hybrid approach. First, the text will be encrypted by one of substitution encrypted methods then, the result will be hidden in a color image by using the chaotic equation (which is also used to create cipher text). Then, measurements PSNR, MSE and NC are used to calculate the effectiveness of the proposed method is described pictorially and also has been shown that a multi-level of security of data can be achieved.

References
  1. Banerjee, I. ; Bhattacharyya, S. ; and Sanyal, G. (2011). Novel Text Steganography through Special Code Generation. International Conference on Systemic, Cybernetics and Informatics, Paper Identification Number: CI-3. 4, 289-303.
  2. Alla, K. ; and Prasad, S. R. (2008). A Novel Hindi Text Steganography Using Letter Diacritics and Its compound Words. International Journal of Computer Science and Network Security (IJCSNS), VOL. 8 No. 12, 404-409.
  3. POR, L. Y. ; and Delina, B. (2008). Information Hiding: A New Approach in Text Steganography. 7th WSEAS Int. Conf. on APPLIED COMPUTER & APPLIED COMPUTATIONAL SCIENCE (ACACOS '08), Hangzhou, China, 689-695.
  4. Bhattacharyya, S. ; and Sanyal, G. (2009). Hiding Data in Images Using PCP. International Journal of Computer and Information Engineering 3:3, 2009, 151-157. IVSL
  5. Al-Taani, A. T. ; and AL-Issa, A. M. (2009). A Novel Stenographic Method for Gray-Level Images. World Academy of Science, Engineering and Technology 51 2009 ,613-618.
  6. Ibrahim, A. ; Zabian, A. ; Esteteya, F. N. ; and Alpadawy, A. K. (2009). Algorithm for Text Hiding in Digital Image for Information Security. International Journal of Computer Science and Network Security (IJCSNS), VOL. 9 No. 6, 262-268.
  7. Sahoo, G. ; and Tiwari, R. K. (2008). Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization. International Journal of Computer Science and Network Security (IJCSNS), VOL. 8 No. 1. , January, 228-233. IVSL
  8. Ibrahim, R. ; and Kuan, T. S. (2010). Steganography Imaging System (SIS): Hiding Secret Message inside an Image . Proceedings of the World Congress on Engineering and Computer Science Vol I , October (20-22), San Francisco, USA, 144-148.
  9. Yadav, R. ; Saini, R. ; and Kamal deep. (2011). A New Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain. International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 7, 2679- 2690. IVSL.
  10. Stallings, W. (2008). Cryptography and Network Security: Principle and Practice, Second Edition. Prentice Hall, 29-41.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Color image Hide data Security Plaintext Chaotic Keyword Mixed