IJCNIS Vol. 10, No. 1, 8 Jan. 2018
Cover page and Table of Contents: PDF (size: 777KB)
Full Text (PDF, 777KB), PP.1-9
Views: 0 Downloads: 0
Chaotic maps, data hiding, information security, pixel pairs, pixel selection
In this paper, a new data hiding algorithm based on pixel pairs using chaotic map is proposed. Data hiding scheme is created by applying modulo function to pixel pairs. In here, pseudo random number generator (PRNG) is obtained from chaotic maps. The PRNG is very important for this algorithm since the data hiding coefficients are chosen by PRNG. For example, if the coefficient is 0, subtraction operator is used between pixel pairs. If coefficient is 1, summary operator is used for selected pixel pairs. The proposed algorithm is evaluated by embedding different sized secret data into different test images. This method is compared with the determined studies in the literature and the obtained results is evaluated. In this study, special rules are also defined to pixels which have boundary values for resolve overflow/underflow problem. Minimal changes are performed to reach the desired value of the pixel values. According to the results obtained, the proposed algorithm has high visual quality, good running time, secure and high payload capacity.
Sengul Dogan, "A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.1, pp.1-9, 2018. DOI:10.5815/ijcnis.2018.01.01
[1]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey”, Proc.of the IEEE, vol. 87(7), pp. 1062-1078, 1999.
[2]I. Vajda,"On Classical Cryptographic Protocols in Post-Quantum World", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.8, pp.1-8, 2017.DOI:10.5815/ijcnis.2017.08.01
[3]A. H. Lone, and M. Uddin, “A Novel Scheme for Image Authentication and Secret Data Sharing”. International Journal of Computer Network and Information Security, vol. 8(9), pp. 10, 2016.
[4]T. C. Lu, C. Y. Tseng, and J. H. Wu, “Dual imaging-based reversible hiding technique using LSB matching”, Sig.Proc., vol. 108, pp. 77–89, 2015.
[5]Y. Liu, Z. Li, X. Ma, and J. Liu, “A robust data hiding algorithm for H.264/AVC video streams”, J. of Systems and Software, vol. 86(8), pp. 2174-2183, 2013.
[6]S. U. Maheswari, and D. J. Hemanth, “Image Steganography using Hybrid Edge Detector and Ridgelet Transform”. Def.Sci.J., vol. 65(3), pp. 214-219, 2015.
[7]J. J. Garcia-Hernandez, R. Parra-Michel, C. Feregrino-Uribe, and R. Cumplido, “High payload data-hiding in audio signals based on a modified OFDM approach”, Exp.Systems with App., vol. 40(8), pp. 3055-3064, 2013.
[8]Y. C. Chen, C. W. Shiu, and G. Horng, “Encrypted signal-based reversible data hiding with public key cryptosystem”, J.of Visual Com. and Image Rep., vol. 25(5), pp. 1164-1170, 2014.
[9]N. Wang, H. Zhang, and C. Men, A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates, Comp.-Aided Design, vol. 47, pp. 108-117, 2014.
[10]W. Hong, T. S. Chen, and J. Chen, “Reversible data hiding using Delaunay triangulation and selective embedment”, Inf.Sciences, vol. 308, pp. 140-154, 2015.
[11]S. Dogan, “A new data hiding method based on chaos embedded genetic algorithm for color image”, Artificial Intell.Review, vol. 46(1), pp. 129-143, 2016.
[12]P. V. S. Govind, and M. Wilscy, “A New Reversible Data Hiding Scheme with Improved Capacity Based on Directional Interpolation and Difference Expansion”, Procedia Comp.Science, vol. 46, pp. 491-498, 2015.
[13]R. Cogranne, and F. Retraint, “Application of hypothesis testing theory for optimal detection of LSB matching data hiding”, Sig.Proc., vol. 93(7), pp. 1724-1737, 2013.
[14]K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, and S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks”. Fut.Gen.Computer Syst., http://dx.doi.org/10.1016/j.future.2016.11.029, 2016.
[15]S. Dogan, “A reversible data hiding scheme based on graph neighbourhood degree”. J.of Experimental& Theoretical Artificial Intell. vol. 29(4), pp. 741-753, 2016.
[16]Y. K. Chan, W. T. Chen, S. S. Yu, Y. A. Ho, C. S. Tsai, and Y. P. Chu, “A HDWT-based reversible data hiding method”, J.of Systems and Software, vol. 82(3), pp.411-421, 2009.
[17]Y. K. Lin, “A data hiding scheme based upon DCT coefficient modification”, Comp.Standards&Interfaces, vol. 36(5), pp.855-862, 2014.
[18]J. Chen, “A PVD-based data hiding method with histogram preserving using pixel pair matching”, Sig.Proc.: Image Communication, vol. 29(3), pp.375-384, 2014.
[19]S. Y. Shen, and L. H. Huang, “A data hiding scheme using pixel value differencing and improving exploiting modification directions”, Computers & Security, vol. 48, pp. 131-141, 2015.
[20]X. Qu, and H. J. Kim, “Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding”, Sig.Proc., vol. 111, 249-260, 2015.
[21]X. Wang, J. Ding, and Q. Pei, “A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition”, Information Sciences, vol. 310, pp.16-35, 2015.
[22]C. C. Lin, and N. L. Hsueh, “A lossless data hiding scheme based on three-pixel block differences”, Pattern Recog., vol. 41(4), pp. 1415-1425, 2008.
[23]X. Li, J. Li, B. Li, and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion”, Sig.Proc., vol. 93(1), pp.198-205, 2015.
[24]Y. Y. Tsai, D. S. Tsai, and C. L. Liu, “Reversible data hiding scheme based on neighboring pixel differences”, Dig.Sig.Proc., vol. 23(3), pp. 919-927, 2013.
[25]W. Hong, T. S. Chen, and C. W. Luo, “Data embedding using pixel value differencing and diamond encoding with multiple-base notational system”, J.of Systems and Software, vol. 85(5), pp. 1166-1175, 2012.
[26]C. H. Yang, C. Y. Weng, H. K. Tso, and S. J. Wang, “A data hiding scheme using the varieties of pixel-value differencing in multimedia images”, J.of Systems and Software, vol. 84(4), pp. 669-678, 2011.
[27]Y. P. Lee, J. C. Lee, W. K. Chen, K. C. Chang, I. J. Su, and C. P. Chang, “High-payload image hiding with quality recovery using tri-way pixel-value differencing”, Information Sciences, vol. 191, pp. 214-225, 2012.
[28]F. Peng, X. Li, and B. Yang, “Improved PVO-based reversible data hiding”, Dig.Sig.Proc., vol. 25, pp.255-265, 2014.
[29]C. C. Chang, Y. H. Huang, H. Y. Tsai, and C. Qin, “Prediction-based reversible data hiding using the difference of neighboring pixels”, AEU – Inter. J.of Electronics and Com., vol. 66(9), pp.758-766, 2012.
[30]G. Chen, and Y. Huang, “Chaotic Maps Dynamics, Fractals, and Rapid Fluctuations”, Morgan & Claypool Publishers, 2011.
[31]A. Baykasoglu, “Design optimization with chaos embedded great deluge algorithm”, App.Soft.Comp., vol. 12, pp. 1055–1067, 2012.
[32]R. Ye, W. Guo,"An Image Encryption Scheme Based on Chaotic Systems with Changeable Parameters", IJCNIS, vol.6, no.4, pp.37-45, 2014. DOI: 10.5815/ijcnis.2014.04.05
[33]L. Acho, “A discrete-time chaotic oscillator based on the logistic map: A secure communication scheme and a simple experiment using Arduino”, J.of the Franklin Institute, vol. 352 (8), pp. 3113–3121, 2015.
[34]SIPI Image Dataset, http://sipi.usc.edu/database/. (03.12.2014).
[35]Kodak Lossless True Color Image Suite, http://r0k.us/graphics/kodak/ (05.01.2015).
[36]W. Zhang, K. Ma, and N. Yu, “Reversibility improved data hiding in encrypted images”, Sig.Proc., vol. 94, pp.118–127, 2014.
[37]Z. Wang, and A. C. Bovik, “A Universal Image Quality Index”, IEEE Sig.Proc.Letters, vol. 9(3), pp.1-4, 2002.
[38]C. C. Chang, and T. C. Lu, “A difference expansion oriented data hiding scheme for restoring the original host image”, J.of Systems and Software, vol. 79, pp.1754-1766, 2006.
[39]C. T. C. Lu, C. Chang, and Y. H. Huang, “High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting”, Multimedia Tools and App., vol. 71(1), pp. 417-435, 2014.