Least Significant Bit Steganography using Hitzl-Zele Chaotic Map
Abstract
Full Text:
PDFReferences
Alvarez, G., Li, S. (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems, International Journal of Bifurcation and Chaos, 16, 2129 - 2151.
Amirtharajan, R., Rayappan, J.B.B. (15 June 2012), An intelligent chaotic embedding approach to enhance stego-image quality, Information Sciences, Volume 193, Pages 115-124
Aziz, M., Tayarani-N, M.H., and Afsar, M. (2015), A cycling chaos based cryptic-free algorithm for image steganography, Nonlinear Dynamics, 80 (3), 1271-1290.
Diaconu, A.V. (2015), A Parallel Architecture Design for Ultra-Fast Image Encryption within WMSNS, Proceedings of the Romanian Academy, Series A 16 (SI), 313-320.
Fridrich, J. (1998), Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Int. J. Bifurcation Chaos, 8, 1259-1284.
Hitzl, D.L., Zele, F. (1985), An exploration of the Henon quadratic map, Physica D: Nonlinear Phenomena, Volume 14, Issue 3, Pages 305-326.
Marsaglia, G. DIEHARD: a Battery of Tests of Randomness, http://www.fsu.edu/pub/diehard/.
Nassar, S.S., Ayad, N.M., Kelash, H.M., El-sayed, H.S., El-Bendary, M.A.M., Abd El-Samie, F.E., Faragallah, O.S. (2016), Secure Wireless
Image Communication Using LSB Steganography and Chaotic Baker, Ciphering Wireless Personal Communications, 91 (3), pp. 1023-1049.
Nithin Kumar, S.S.V., Charan, G.S., Karthikeyan, B., Vaithiyanathan, V., Rajasekhar Reddy, M. (2016), A hybrid approach for data hiding through chaos theory and reversible integer mapping, Advances in Intelligent Systems and Computing, 412, pp. 483-492.
Parvees, M.Y.M., Samath, J.A., Kaspar Raj, I., Madhavan Nirmal, R. (2017), Chaos-based steganocryptic approach to protect medical images with text data of patients, Journal of Medical Imaging and Health Informatics, 7 (1), pp. 118-125.
Pichler, F. and Scharinger, J. (1995), Ciphering by Bernoulli-shifts in finite Abelian groups, Contributions to General Algebra, Vol. 9, eds.
Kaiser, H.K., Muller, W.B. and Pilz G.F., A-4040 Linz, 249-256.
Pichler, F. and Scharinger, J. (1995), Finite dimensional generalized Baker dynamical systems for cryptographic applications, Lecture Notes in Computer Science, Vol. 1030, 465-476.
Rajendran, S., Doraipandian, M. (2017), Chaotic Map Based Random Image Steganography Using LSB Technique, International Journal of Network Security, Vol.19, No.4, 593-598.
Ranjith Kumar, R., Jayasudha, S., Pradeep, S. (2016), Efficient and secure data hiding in encrypted images, A new approach using chaos
Information Security Journal, 25 (4-6), pp. 235-246.
Saha, P., Stragatz, S.H. (1995), The Birth of Period Three, Mathematics Magazine, 68 (1), pp. 42-47.
Saturday, J.C., Udofia, K.M., and Jimoh, A.J. (2016), Design of Dual Band Microstrip Antenna Using Reactive Loading Technique, Mathematical and Software Engineering, 2 (2), 114-121.
Rukhin, A., J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo
(2010), “A Statistical test suite for random and pseudorandom number generators for cryptographic application,” NIST Special Publication 800-22, Revision 1a (Revised: April 2010), Lawrence E. Bassham III, http://csrc.nist.gov/rng/.
Stoyanov, B.P., Zhelezov, S.K., Kordov, K.M. (2016), Least significant bit image steganography algorithm based on chaotic rotation equations, Comptes Rendus de L’Academie Bulgare des Sciences, 69 (7), 845-850.
Walker, J., ENT: a pseudorandom number sequence test program, http://www.fourmilab.ch/random/.
Yang, C, Liu, F., Lian, S., Luo, X., Wang, D. (2012), Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. Comput J., 55, 717-727.
IEEE Computer Society (2008), 754-2008 - IEEE Standard for Floating-Point Arithmetic, Revision of ANSI/IEEE Std 754-1985, DOI:
1109/IEEESTD.2008.4610935.
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences
eISSN: 2300-1933