We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Image Steganography using Index based Chaotic Mapping

Published on January 2015 by Shreenandan Kumar, Suman Kumari, Sucheta Patro andtushar Shandilya, Anuja Kumar Acharya
International Conference on Distributed Computing and Internet Technology
Foundation of Computer Science USA
ICDCIT2015 - Number 1
January 2015
Authors: Shreenandan Kumar, Suman Kumari, Sucheta Patro andtushar Shandilya, Anuja Kumar Acharya
b7f43e16-0909-4ba6-8418-a4e0c57f5a37

Shreenandan Kumar, Suman Kumari, Sucheta Patro andtushar Shandilya, Anuja Kumar Acharya . Image Steganography using Index based Chaotic Mapping. International Conference on Distributed Computing and Internet Technology. ICDCIT2015, 1 (January 2015), 1-4.

@article{
author = { Shreenandan Kumar, Suman Kumari, Sucheta Patro andtushar Shandilya, Anuja Kumar Acharya },
title = { Image Steganography using Index based Chaotic Mapping },
journal = { International Conference on Distributed Computing and Internet Technology },
issue_date = { January 2015 },
volume = { ICDCIT2015 },
number = { 1 },
month = { January },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icdcit2015/number1/19406-4001/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Distributed Computing and Internet Technology
%A Shreenandan Kumar
%A Suman Kumari
%A Sucheta Patro andtushar Shandilya
%A Anuja Kumar Acharya
%T Image Steganography using Index based Chaotic Mapping
%J International Conference on Distributed Computing and Internet Technology
%@ 0975-8887
%V ICDCIT2015
%N 1
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

There have been many techniques for hiding messages in images in such a manner that the alterations made to the image are perceptually indiscernible. The Least-significant bit (LSB)-based approach is the most popular type of steganographic algorithm. However, we find that in most existing approaches the choice of embedding positions within the cover image are not secure enough. In this paper, we have used 1D chaotic logistic map to generate the pseudo random numbers; the index values of the sorted pseudo random numbers are the positions used to embed the message in the cover image. This technique provides sufficient security as the same set of numbers cannot be generated without knowing the exact key and thus the message is more secure. The proposed technique has been applied and tested successfully on various images producing significant results.

References
  1. A. Tirkel , R. Schyndel and C. Os born, "A digital watermark", in Proc. IEEE Int. Conf. Image Processing. 1994, vol. 2, pp. 86-90.
  2. R. Wolfgang and E. Delp, "A watermark for digital image", in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 3, pp. 219-222.
  3. A. Daneshkhah, H. Aghaeinia, and S. H. Seyedi, "A more secure steganography method in spatial Domain," in Intelligent Systems, Modelling and Simulation (ISMS), 2011 Second International Conference on, pp. 189–194, IEEE, 2011.
  4. R. -Z. Wang, C. -F. Lin, and J. -C. Lin, "Image hiding by optimal lsb substitution and genetical algorithm," Pattern recognition, vol. 34, no. 3, pp. 671–683, 2001.
  5. R. Mersereau and F. Alturki, "Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation", in Proc. IEEE Int. Conf. on Image Processing, vol. 2,2001, pp. 542-545.
  6. W. Sweldens y B. Yeo ,A. R. Calderbank, I. Daubechies, "Lossless ImageCompression Using Integer to Integer Wavelet Transforms", Proc. of Int. Conf. on Image Proc, 1997, pp. 596-599.
  7. Anuja Kumar Acharya, 2011. Image encryption using new chaos based encryption algorithm. In International Conference on Communication, Computing & Security (ICCCS).
  8. D. N. Naitik P Kamdar, Dipesh G. Kamdar, "Performance evaluation of lsb based steganography for Optimization of psnr and mse," Journal of information, knowledge and research in electronics and Communication engineering, vol. 2, no. 2, pp. 505–509.
  9. N. S. Raghava1, Ashish Kumar, Aishwarya Deep and Abhilasha Chahal, "Improved LSB method for Image Steganography using H´enon Chaotic Map", open journal of information security and applications volume 1, number 1, june 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Chaotic Map Logistic Map Lsb Technique.