Skip to main content
Top

2016 | OriginalPaper | Chapter

A Hybrid Approach for Data Hiding Through Chaos Theory and Reversible Integer Mapping

Authors : S. S. V. Nithin Kumar, Gunda Sai Charan, B. Karthikeyan, V. Vaithiyanathan, M. Rajasekhar Reddy

Published in: Computational Intelligence, Cyber Security and Computational Models

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Steganography is the science which deals with hiding the message so that the intruder cannot even detect its existence. This paper proposes an efficient approach which embeds data into the cover image which is in the frequency domain. DCT is applied to the cover image using integer mapping and the encrypted secret is embedded into it using 3, 3, 2 LSB substitution. The encryption is achieved through chaos theory and ceaser cipher technique. The integer mapping is a method which transforms a given image into its DCT transform and transforms back into the spatial domain without any loss. The proposed method provides a high level of security since secret data is encrypted using chaos theory and embedded into DCT transformed cover image.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–316 (1996)CrossRef Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–316 (1996)CrossRef
2.
go back to reference Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2011)CrossRef Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2011)CrossRef
3.
go back to reference Zhao, Z.-J., Chen, H.-X., Chen, M.-S.: Integer Implementation of four-dimensional matrix DCT. Jilin Daxue Xuebao (Gongxueban)/J. Jilin University (Engineering and Technology Edition) 38(3), 700–703 (2008) Zhao, Z.-J., Chen, H.-X., Chen, M.-S.: Integer Implementation of four-dimensional matrix DCT. Jilin Daxue Xuebao (Gongxueban)/J. Jilin University (Engineering and Technology Edition) 38(3), 700–703 (2008)
4.
go back to reference Plonka, G.: A global method for invertible integer DCT and integer wavelet algorithms. Appl. Comput. Harmonic Anal. 16(2), 90–110 (2004)CrossRefMathSciNetMATH Plonka, G.: A global method for invertible integer DCT and integer wavelet algorithms. Appl. Comput. Harmonic Anal. 16(2), 90–110 (2004)CrossRefMathSciNetMATH
5.
go back to reference Gulve, A.K, Joshi, M.S.: An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math. Problems Eng. 684824 (2015) Gulve, A.K, Joshi, M.S.: An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math. Problems Eng. 684824 (2015)
6.
go back to reference Koikara, R., Deka, D.J., Gogoi, M., Das, R.: A novel distributed image steganography method based on block-DCT. Lecture Notes Electr. Eng. 315, 423–435 (2014)CrossRef Koikara, R., Deka, D.J., Gogoi, M., Das, R.: A novel distributed image steganography method based on block-DCT. Lecture Notes Electr. Eng. 315, 423–435 (2014)CrossRef
7.
go back to reference Vaithiyanathan, V., Karthikeyan, B., Venkatraman, B.: Image segmentation based on modified Tsallis entropy. Contemp. Eng. Sci. 7(9–12), 523–529 (2014) Vaithiyanathan, V., Karthikeyan, B., Venkatraman, B.: Image segmentation based on modified Tsallis entropy. Contemp. Eng. Sci. 7(9–12), 523–529 (2014)
8.
go back to reference Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Paramartha, D.: A novel secure image steganography method based on Chaos theory in spatial domain. Int. J. Secur. Privacy Trust Manage. 3(1) (2014) Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Paramartha, D.: A novel secure image steganography method based on Chaos theory in spatial domain. Int. J. Secur. Privacy Trust Manage. 3(1) (2014)
9.
go back to reference Aziz, M., Tayarani N.M.H., Afsar, M.: A cyclic chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics (2015) Aziz, M., Tayarani N.M.H., Afsar, M.: A cyclic chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics (2015)
10.
go back to reference Karthikeyan, B., Chakravarthy, J., Vaithiyanathan, V.: An enhanced Hill cipher approach for image encryption in steganography. Int. J. Electron. Secur. Digit. Forensics 5(3–4), 178–187 (2013)CrossRef Karthikeyan, B., Chakravarthy, J., Vaithiyanathan, V.: An enhanced Hill cipher approach for image encryption in steganography. Int. J. Electron. Secur. Digit. Forensics 5(3–4), 178–187 (2013)CrossRef
11.
go back to reference Thenmozhi, S., Chandrasekaran, M.: A novel technique for image steganography using nonlinear chaotic map. In: 7th International Conference on Intelligent Systems and Control, ISCO (2013) Thenmozhi, S., Chandrasekaran, M.: A novel technique for image steganography using nonlinear chaotic map. In: 7th International Conference on Intelligent Systems and Control, ISCO (2013)
12.
go back to reference Lin, Y.-K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interf. 36(5), 855–862 (2014)CrossRef Lin, Y.-K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interf. 36(5), 855–862 (2014)CrossRef
13.
go back to reference Sudha, K.L., Prasad, M.: Chaos image encryption using pixel shuffling with Henon map. Proc. Elixir Elec. Engg 38, 4492–4495 (2011) Sudha, K.L., Prasad, M.: Chaos image encryption using pixel shuffling with Henon map. Proc. Elixir Elec. Engg 38, 4492–4495 (2011)
14.
go back to reference Zaghbani, S., Rhouma, R.: Data hiding in spatial domain image using chaotic map. In: 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO, 6552626 (2013) Zaghbani, S., Rhouma, R.: Data hiding in spatial domain image using chaotic map. In: 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO, 6552626 (2013)
15.
go back to reference Yusong, Y., Qingyun, S.: Reversible DCT mapping integers to integers and lossless image compression. Ruan Jian Xue Bao/J. Softw. 11(5), 620–627 (2000) Yusong, Y., Qingyun, S.: Reversible DCT mapping integers to integers and lossless image compression. Ruan Jian Xue Bao/J. Softw. 11(5), 620–627 (2000)
16.
go back to reference Hao, P., Shi, Q.: Matrix factorizations for reversible integer mapping. IEEE Trans. Signal Process. 49(10), 2314–2324 (2001)CrossRefMathSciNet Hao, P., Shi, Q.: Matrix factorizations for reversible integer mapping. IEEE Trans. Signal Process. 49(10), 2314–2324 (2001)CrossRefMathSciNet
17.
go back to reference Karthikeyan, B., Ramakrishnan, S., Vaithiyanathan, V., Sruthi, S., Gomathymeenakshi, M.: An improved steganography technique using LSB replacement on a scanned path image. Int. J. Network Secur. 16(1), 14–18 Karthikeyan, B., Ramakrishnan, S., Vaithiyanathan, V., Sruthi, S., Gomathymeenakshi, M.: An improved steganography technique using LSB replacement on a scanned path image. Int. J. Network Secur. 16(1), 14–18
19.
go back to reference Fridrich, J., Du, R., Meng, L.: Steganalysis and LSB encoding in color images. In: Proceedings of ICME 2000, N. Y., USA Fridrich, J., Du, R., Meng, L.: Steganalysis and LSB encoding in color images. In: Proceedings of ICME 2000, N. Y., USA
20.
go back to reference Zhang, Y., Zuo, F., Zhai, Z., Xiaobin, C.: A new image encryption algorithm based on multiple chaos system. In: Proceedings of the International Symposium on Electronic Commerce and Security (ISECS ’08), 2008, pp. 347–350 Zhang, Y., Zuo, F., Zhai, Z., Xiaobin, C.: A new image encryption algorithm based on multiple chaos system. In: Proceedings of the International Symposium on Electronic Commerce and Security (ISECS ’08), 2008, pp. 347–350
21.
go back to reference Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: A spatial domain image steganography technique based on plane bit substitution method. Global J. Comput. Sci. Technol. (2012) Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: A spatial domain image steganography technique based on plane bit substitution method. Global J. Comput. Sci. Technol. (2012)
Metadata
Title
A Hybrid Approach for Data Hiding Through Chaos Theory and Reversible Integer Mapping
Authors
S. S. V. Nithin Kumar
Gunda Sai Charan
B. Karthikeyan
V. Vaithiyanathan
M. Rajasekhar Reddy
Copyright Year
2016
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0251-9_45

Premium Partner