Least Significant Bit Steganography using Hitzl-Zele Chaotic Map

Authors

Abstract

We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique.

Author Biography

Krasimir Mitkov Kordov, Konstantin Preslavsky University of Shumen

Assoc. Prof. of Computer Sciences, University of Shumen, Bulgaria

PhD of Computer Sciences

References

Alvarez, G., Li, S. (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems, International Journal of Bifurcation and Chaos, 16, 2129 - 2151.

Amirtharajan, R., Rayappan, J.B.B. (15 June 2012), An intelligent chaotic embedding approach to enhance stego-image quality, Information Sciences, Volume 193, Pages 115-124

Aziz, M., Tayarani-N, M.H., and Afsar, M. (2015), A cycling chaos based cryptic-free algorithm for image steganography, Nonlinear Dynamics, 80 (3), 1271-1290.

Diaconu, A.V. (2015), A Parallel Architecture Design for Ultra-Fast Image Encryption within WMSNS, Proceedings of the Romanian Academy, Series A 16 (SI), 313-320.

Fridrich, J. (1998), Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Int. J. Bifurcation Chaos, 8, 1259-1284.

Hitzl, D.L., Zele, F. (1985), An exploration of the Henon quadratic map, Physica D: Nonlinear Phenomena, Volume 14, Issue 3, Pages 305-326.

Marsaglia, G. DIEHARD: a Battery of Tests of Randomness, http://www.fsu.edu/pub/diehard/.

Nassar, S.S., Ayad, N.M., Kelash, H.M., El-sayed, H.S., El-Bendary, M.A.M., Abd El-Samie, F.E., Faragallah, O.S. (2016), Secure Wireless

Image Communication Using LSB Steganography and Chaotic Baker, Ciphering Wireless Personal Communications, 91 (3), pp. 1023-1049.

Nithin Kumar, S.S.V., Charan, G.S., Karthikeyan, B., Vaithiyanathan, V., Rajasekhar Reddy, M. (2016), A hybrid approach for data hiding through chaos theory and reversible integer mapping, Advances in Intelligent Systems and Computing, 412, pp. 483-492.

Parvees, M.Y.M., Samath, J.A., Kaspar Raj, I., Madhavan Nirmal, R. (2017), Chaos-based steganocryptic approach to protect medical images with text data of patients, Journal of Medical Imaging and Health Informatics, 7 (1), pp. 118-125.

Pichler, F. and Scharinger, J. (1995), Ciphering by Bernoulli-shifts in finite Abelian groups, Contributions to General Algebra, Vol. 9, eds.

Kaiser, H.K., Muller, W.B. and Pilz G.F., A-4040 Linz, 249-256.

Pichler, F. and Scharinger, J. (1995), Finite dimensional generalized Baker dynamical systems for cryptographic applications, Lecture Notes in Computer Science, Vol. 1030, 465-476.

Rajendran, S., Doraipandian, M. (2017), Chaotic Map Based Random Image Steganography Using LSB Technique, International Journal of Network Security, Vol.19, No.4, 593-598.

Ranjith Kumar, R., Jayasudha, S., Pradeep, S. (2016), Efficient and secure data hiding in encrypted images, A new approach using chaos

Information Security Journal, 25 (4-6), pp. 235-246.

Saha, P., Stragatz, S.H. (1995), The Birth of Period Three, Mathematics Magazine, 68 (1), pp. 42-47.

Saturday, J.C., Udofia, K.M., and Jimoh, A.J. (2016), Design of Dual Band Microstrip Antenna Using Reactive Loading Technique, Mathematical and Software Engineering, 2 (2), 114-121.

Rukhin, A., J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo

(2010), “A Statistical test suite for random and pseudorandom number generators for cryptographic application,” NIST Special Publication 800-22, Revision 1a (Revised: April 2010), Lawrence E. Bassham III, http://csrc.nist.gov/rng/.

Stoyanov, B.P., Zhelezov, S.K., Kordov, K.M. (2016), Least significant bit image steganography algorithm based on chaotic rotation equations, Comptes Rendus de L’Academie Bulgare des Sciences, 69 (7), 845-850.

Walker, J., ENT: a pseudorandom number sequence test program, http://www.fourmilab.ch/random/.

Yang, C, Liu, F., Lian, S., Luo, X., Wang, D. (2012), Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. Comput J., 55, 717-727.

IEEE Computer Society (2008), 754-2008 - IEEE Standard for Floating-Point Arithmetic, Revision of ANSI/IEEE Std 754-1985, DOI:

1109/IEEESTD.2008.4610935.

Downloads

Published

2017-10-31

Issue

Section

Security, Safety, Military