An Efficient Steganography Technique for Images using Chaotic Bitstream

Full Text (PDF, 436KB), PP.21-27

Views: 0 Downloads: 0

Author(s)

Hidayet Ogras 1,*

1. Department of Electrical Education, Batman University, Batman, 72100, Turkey

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.02.03

Received: 30 Nov. 2018 / Revised: 9 Dec. 2018 / Accepted: 14 Dec. 2018 / Published: 8 Feb. 2019

Index Terms

Image steganography, chaos, logistic map, information hiding, LSB replacement

Abstract

Steganography is a science of security technique through invisible communication; hiding secret message into cover objects without any suspicion. Protection of the hidden information from an adversary is the main purpose of any steganography system even if the embedding method is obvious. In this paper, an effective image steganography system based on a least significant bit (LSB) algorithm and chaos is proposed. The proposed method contains a spatial domain technique in which the Logistic map is used for generating chaotic bitstream and bitwise XOR operation which is used to create control bit. Control bit determines whether the LSB of a specific pixel is changed or not according to the secret message. This provides direct manipulation over the pixels of the image with a very low precision hence enhances the system security. In this study, gray image is used as secret message and a larger scale image as cover image. Experimental results demonstrate that the proposed method is very efficient to detect LSB replacement in the algorithm. Moreover, the proposed algorithm is highly sensitive to the stego key parameters due to complex structure of chaos which provides high level of security in the whole system and effectively hides and detects the image information.

Cite This Paper

Hidayet Ogras, "An Efficient Steganography Technique for Images using Chaotic Bitstream", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.2, pp.21-27, 2019. DOI:10.5815/ijcnis.2019.02.03

Reference

[1]A. A. J. Altaay, S. B. Sahib and M. Zamani, “An introduction to image Steganography techniques,” International Conference on Advanced Computer Science Applications and Technologies, Malaysia, November 2012, pp. 122–126.
[2]V. L. Reddy, “Novel chaos based Steganography for Images using matrix encoding and cat mapping techniques,” Information Security and Computer Fraud, vol. 3(1), pp. 8-14, 2015.
[3]J. Fridrich, M. Goljan and R. Du, “Reliable detection of LSB Steganography in Color and Grayscale images,” Proceedings of the 2001 Workshop on Multimedia and security: new challenges, Canada, October 2001, pp. 27-30.
[4]K. Satish, T. Jayakar, C. Tobin, K. Madhavi and K. Murali, “Chaos based spread spectrum image Steganography,” IEEE Transactions on Consumer Electronics, vol. 50(2), pp. 587-590, 2004.
[5]M. Y. Valandar, P. Ayubi and M. J. Barani, “A new transform domain steganography based on modified logistic chaotic map for color images,” Journal of Information Security and Applications Transactions on Consumer Electronics, vol. 34(2), pp. 142-151, 2017.
[6]A. Pradhan, A. K. Sahu, G. Swain and K. R. Sekhar, “Performance evaluation parameters of image Steganography techniques,” International Conference on Research Advances in Integrated Navigation Systems, India, December 2016, pp. 1-8.
[7]C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3(3), pp. 488-497, 2008.
[8]S. Dogan, “A new approach for data hiding based on pixel pairs and chaotic map,” I. J. of Computer Network and Information Security, vol. 10(1), pp. 1-9, 2018.
[9]S. Sun, “A novel secure image steganography using improved Logistic map and DNA techniques,” J. of Internet Technology, vol. 18(3), pp. 647-652, 2017.
[10]H. Sharma, M. Arya and D. Goyal, “Secure image hiding algorithm using Cryptography and Steganography,” IOSR Journal of Computer Engineering, vol. 13(5), pp. 1-6, 2013.
[11]Varsha, R. S. Chhillar, “Data hiding using Steganography and Cryptography,” I. J. of Computer Science and Mobile Computing, vol. 4(4), pp. 802-805, 2015.
[12]M. Ulker and B. Arslan, “A novel secure model: Image steganography with logistic map and secret key,” 6th International Symposium on Digital Forensic and Security, Turkey, May 2018.
[13]S. V. K. Yadav, S. Batham, “A novel approach of bulk data hiding using text Steganography,” Procedia Computer Science, vol. 57, pp. 1401-1410, 2015.
[14]H. Ogras and M. Turk, “A Robust chaos-based image cryptosystem with an improved key generator and plain image sensitivity mechanism,” J. of Information Security, vol. 8, pp. 23-41, 2017.
[15]L. Quan, L. Pei-Yue, Z. Ming-Chao, S. Yong-Xin and Y. Huai-Jiang, “A Novel image encryption algorithm based on chaos maps with Markov properties,” Communications in Nonlinear Science and Numerical Simulation, vol. 20(2), pp. 506-515, 2015.
[16]N. K. Pareek, V. Patidar and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24(9), pp. 926-934, 2006.
[17]P. J. Rani and S. D. Bhavani, “Symmetric encryption using Logistic map,” 1st International Conference on Recent Advances in Information Technology, India, March 2012.
[18]H. Ogras and M. Turk, “An efficient method to improve the Logistic map: Design and Implementation,” Third International Conference on Electrical, Electronics, Computer Engineering and their Applications, Lebanon, May 2016.
[19]H. Tarrah and S. Mirzakuchaki, “Efficient steganography scheme based on Logistic map and DWT-SVD,” I. J. of Computer Applications, vol. 164(8), pp. 8-11, 2017.
[20]J.-X. Chen, Z.-L. Zhu, C. Fu, H. Yu and L.-B. Zhang, “A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism,” Communications in Nonlinear Science and Numerical Simulation, vol. 20(3), pp. 846-860, 2015.
[21]D. Battikh, S. El Assad, B. Bakhache, O. Deforges and M. Khalil, “Chaos-based spatial steganography sytems for images,” I. J. of Chaotic Computing, vol. 3(1), pp. 36-44, 2014.
[22]S. A. Al-Taweel, M. H. Al-Hada, A. M. Nasser, “Image in image Steganography Technique based on Arnold Transform and LSB Algorithms,” I. J. of Computer Applications, vol. 181(10), pp. 32-39, 2018.