Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 4/2020

04-12-2019 | Research Article - Computer Engineering and Computer Science

LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map

Authors: J. L. Pichardo-Méndez, L. Palacios-Luengas, R. F. Martínez-González, O. Jiménez-Ramírez, R. Vázquez-Medina

Published in: Arabian Journal for Science and Engineering | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we propose a LSB steganography algorithm to hide pseudorandomly sensitive information in digital images. This algorithm affects the statistic features of the sensitive information before it is embedded in the cover image. Also, it satisfies the imperceptibility condition of the hidden information, required in steganography systems, by using a pseudorandom LSB technique endorsed on three chaotic noise generators based on the skew tent chaotic map. Additionally, the embedding capacity of the proposed algorithm can be up to 37% of the cover image size, satisfying the imperceptibility condition, when one bit of sensitive information is embedded per each embedding pixel. We evaluated the proposed algorithm using two criteria: cover image affectation and robustness against steganalysis attacks. To evaluate the cover image affectation, we considered metrics of texture, quality and perceptual quality. To evaluate the robustness against attacks, we use the StegExpose tool, which analyzes the images obtained from the proposed algorithm, and it includes the main methods of steganalysis such as Sample Pairs, RS Analysis, Chi-Square Attack and Primary Sets Analysis. Finally, we show that the proposed algorithm has similar performance, and even better, to three commonly used steganography tools.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gonzalez-Vasco, M.; Hess, F.; Steinwandt, R.: Combined schemes for signature and encryption: the public-key and the identity-based setting. Inf. Comput. 247, 1–10 (2016)MathSciNetMATH Gonzalez-Vasco, M.; Hess, F.; Steinwandt, R.: Combined schemes for signature and encryption: the public-key and the identity-based setting. Inf. Comput. 247, 1–10 (2016)MathSciNetMATH
2.
go back to reference Saeed, M.J.: A new technique based on chaotic steganography and encryption text in DCT domain for color image. J. Eng. Sci. Technol. 8(5), 508–520 (2013)MathSciNet Saeed, M.J.: A new technique based on chaotic steganography and encryption text in DCT domain for color image. J. Eng. Sci. Technol. 8(5), 508–520 (2013)MathSciNet
3.
go back to reference Hou, D.; Zhang, W.; Yu, N.: Image camouflage by reversible image transformation. J. Vis. Commun. Image Represent. 40, 225–236 (2016) Hou, D.; Zhang, W.; Yu, N.: Image camouflage by reversible image transformation. J. Vis. Commun. Image Represent. 40, 225–236 (2016)
4.
go back to reference Jiang, Y.; Tang, S.: An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimed. Syst. 24(3), 355–363 (2018) Jiang, Y.; Tang, S.: An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimed. Syst. 24(3), 355–363 (2018)
5.
go back to reference Atta, R.; Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J. Vis. Commun. Image Represent. 53, 42–54 (2018) Atta, R.; Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J. Vis. Commun. Image Represent. 53, 42–54 (2018)
6.
go back to reference Uljarevic, D.; Veinovic, M.; Kunjadic, G.; Tepsic, D.: A new way of covert communication by steganography via JPEG images within a Microsoft Word document. Multimed. Syst. 23(3), 333–341 (2015) Uljarevic, D.; Veinovic, M.; Kunjadic, G.; Tepsic, D.: A new way of covert communication by steganography via JPEG images within a Microsoft Word document. Multimed. Syst. 23(3), 333–341 (2015)
7.
go back to reference Subhedar, M.; Mankar, V.: Current status and key issues in image steganography: A survey. Comput. Sci. Rev. 13–14, 95–113 (2014)MATH Subhedar, M.; Mankar, V.: Current status and key issues in image steganography: A survey. Comput. Sci. Rev. 13–14, 95–113 (2014)MATH
8.
go back to reference Sajedi, H.: Steganalysis based on steganography pattern discovery. Inf. Secur. Appl. 30, 3–14 (2016) Sajedi, H.: Steganalysis based on steganography pattern discovery. Inf. Secur. Appl. 30, 3–14 (2016)
9.
go back to reference Miri, A.; Faez, K.: Adaptive image steganography based on transform domain via genetic algorithm. Optik 145, 158–168 (2017) Miri, A.; Faez, K.: Adaptive image steganography based on transform domain via genetic algorithm. Optik 145, 158–168 (2017)
10.
go back to reference Karim, M.S.A.; Wong, K.: Data embedding in random domain. Signal Process. 108(C), 56–68 (2015) Karim, M.S.A.; Wong, K.: Data embedding in random domain. Signal Process. 108(C), 56–68 (2015)
11.
go back to reference Zhang, Y.; Qin, C.; Zhang, W.; Liu, F.; Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99–111 (2018) Zhang, Y.; Qin, C.; Zhang, W.; Liu, F.; Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99–111 (2018)
12.
go back to reference Cheddad, A.; Condell, J.; Curran, K.; Mc-Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)MATH Cheddad, A.; Condell, J.; Curran, K.; Mc-Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)MATH
13.
go back to reference Raj, J.; Sivadasan, E.: Secure transmission of data by splitting image. In: International Conference on Computing and Network Communications, pp. 362–368 (2015) Raj, J.; Sivadasan, E.: Secure transmission of data by splitting image. In: International Conference on Computing and Network Communications, pp. 362–368 (2015)
14.
go back to reference Kaur, H.; Rani, J.: A survey on different techniques of steganography. In:4th International Conference on Advancements in Engineering & Technology 57, 02003 (2016) Kaur, H.; Rani, J.: A survey on different techniques of steganography. In:4th International Conference on Advancements in Engineering & Technology 57, 02003 (2016)
15.
go back to reference Koshy, D.; Vijayananth, S.: Steganography on thermal images using generation technique. In: International Conference on Advanced Communication Control and Computing Technologies, pp. 214–218 (2014) Koshy, D.; Vijayananth, S.: Steganography on thermal images using generation technique. In: International Conference on Advanced Communication Control and Computing Technologies, pp. 214–218 (2014)
16.
go back to reference Carson, R.P.: Synthetic steganography: methods for generating and detecting covert channels in generated media. PhD thesis, Purdue University (2015) Carson, R.P.: Synthetic steganography: methods for generating and detecting covert channels in generated media. PhD thesis, Purdue University (2015)
17.
go back to reference Simmons, G.J.: Advances in cryptology. In: Chaum, David. (ed.) Proceedings of Crypto 83, chapter The Prisoners’ Problem and the Subliminal Channel, pp. 51–67. Springer, Boston (1984) Simmons, G.J.: Advances in cryptology. In: Chaum, David. (ed.) Proceedings of Crypto 83, chapter The Prisoners’ Problem and the Subliminal Channel, pp. 51–67. Springer, Boston (1984)
18.
go back to reference Bender, W.; Gruhl, D.; Morimoto, N.; Aiguo, Lu: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996) Bender, W.; Gruhl, D.; Morimoto, N.; Aiguo, Lu: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)
19.
20.
go back to reference Ou, D.; Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 74(21), 9117–9139 (2014) Ou, D.; Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed. Tools Appl. 74(21), 9117–9139 (2014)
21.
go back to reference Malathi, P.; Gireeshkumar, T.: Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains. Procedia Comput. Sci. 93, 878–885 (2016) Malathi, P.; Gireeshkumar, T.: Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains. Procedia Comput. Sci. 93, 878–885 (2016)
23.
go back to reference Sadeghi, F.; Zarisfi Kermani, F.; Kuchaki Rafsanjani, M.: Optimizing image steganography by combining the GA and ICA. ISC Int. J. Inf. Secur. 7(1), 47–58 (2015) Sadeghi, F.; Zarisfi Kermani, F.; Kuchaki Rafsanjani, M.: Optimizing image steganography by combining the GA and ICA. ISC Int. J. Inf. Secur. 7(1), 47–58 (2015)
24.
go back to reference Mohajon, J.; Ahammed, Z.; Talukder H.K.: An improved approach in audio steganography using genetic algorithm with K-Bit symmetric security key. In: 21st International Conference of Computer and Information Technology (ICCIT), pp. 1–6 (2018) Mohajon, J.; Ahammed, Z.; Talukder H.K.: An improved approach in audio steganography using genetic algorithm with K-Bit symmetric security key. In: 21st International Conference of Computer and Information Technology (ICCIT), pp. 1–6 (2018)
25.
go back to reference Zeng, J.; Zhao, X.; Gan, J.; Mai, C.; Zhai, Y.; Wang, F.: Deep convolutional neural network used in single sample per person face recognition. Comput. Intell. Neurosci. 2018, 3803627 (2018) Zeng, J.; Zhao, X.; Gan, J.; Mai, C.; Zhai, Y.; Wang, F.: Deep convolutional neural network used in single sample per person face recognition. Comput. Intell. Neurosci. 2018, 3803627 (2018)
26.
go back to reference Jarusek, R.; Volna, E.; Kotyrba, M.M.: Robust steganographic method based on unconventional approach of neural networks. Appl. Soft Comput. 67, 505–518 (2018) Jarusek, R.; Volna, E.; Kotyrba, M.M.: Robust steganographic method based on unconventional approach of neural networks. Appl. Soft Comput. 67, 505–518 (2018)
27.
go back to reference Subhedar, M.S.; Mankar, V.H.: Curvelet transform and cover selection for secure steganography. Multimed. Tools Appl. 77(7), 8115–8138 (2018) Subhedar, M.S.; Mankar, V.H.: Curvelet transform and cover selection for secure steganography. Multimed. Tools Appl. 77(7), 8115–8138 (2018)
28.
go back to reference Shafi, I.; Noman, M.; Gohar, M.; Ahmad, A.; Khan, M.; Din, S.; Ahmad, S.H.; Ahmad, J.: An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput. 22(8), 1555–1567 (2018) Shafi, I.; Noman, M.; Gohar, M.; Ahmad, A.; Khan, M.; Din, S.; Ahmad, S.H.; Ahmad, J.: An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput. 22(8), 1555–1567 (2018)
30.
go back to reference Li, Z.; He, Y.: Steganography with pixel-value differencing and modulus function based on PSO. J. Inf. Secur. Appl. 43, 47–52 (2018) Li, Z.; He, Y.: Steganography with pixel-value differencing and modulus function based on PSO. J. Inf. Secur. Appl. 43, 47–52 (2018)
31.
go back to reference Hart, S.V.; Ashcroft, J.; Daniels, D.J.: Forensic examination of digital evidence: a guide for law enforcement. Techreport Technical Report NCJ 199408, US Department of Justice–Office of Justice Programs (2004) Hart, S.V.; Ashcroft, J.; Daniels, D.J.: Forensic examination of digital evidence: a guide for law enforcement. Techreport Technical Report NCJ 199408, US Department of Justice–Office of Justice Programs (2004)
32.
go back to reference Morris, S.: The future of netcrime now (1)—threats and challenges. Techreport Technical Report 62/04, Home Office Crime and Policing Group (2004) Morris, S.: The future of netcrime now (1)—threats and challenges. Techreport Technical Report 62/04, Home Office Crime and Policing Group (2004)
33.
go back to reference Usman, M.A.; Usman, M.R.: Using image steganography for providing enhanced medical data security. In: 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4 (2018) Usman, M.A.; Usman, M.R.: Using image steganography for providing enhanced medical data security. In: 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–4 (2018)
34.
go back to reference Karakus, S.; Avci, E.: Application of similarity-based image steganography method to computerized tomography images. In: 7th International Symposium on Digital Forensics and Security (ISDFS) (2019) Karakus, S.; Avci, E.: Application of similarity-based image steganography method to computerized tomography images. In: 7th International Symposium on Digital Forensics and Security (ISDFS) (2019)
35.
go back to reference Douglas, M.; Bailey, K.; Leeney, M.; Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 77(13), 17333–17373 (2018) Douglas, M.; Bailey, K.; Leeney, M.; Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 77(13), 17333–17373 (2018)
36.
go back to reference Muhammad, K.; Sajjad, M.; Mehmood, I.; Rho, S.; Baik, S.W.: Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener. Comput. Syst. 86, 951–960 (2018) Muhammad, K.; Sajjad, M.; Mehmood, I.; Rho, S.; Baik, S.W.: Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener. Comput. Syst. 86, 951–960 (2018)
37.
go back to reference Roy, S.; Venkateswaran, P.: Online payment system using steganography and visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, pages 1–5 (2014) Roy, S.; Venkateswaran, P.: Online payment system using steganography and visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, pages 1–5 (2014)
38.
go back to reference Rura, L.; Issac, B.; Haldar, M.K.: Online voting system based on image steganography and visual cryptography. J. Comput. Inf. Technol. 25(1), 47–61 (2017) Rura, L.; Issac, B.; Haldar, M.K.: Online voting system based on image steganography and visual cryptography. J. Comput. Inf. Technol. 25(1), 47–61 (2017)
39.
go back to reference Raeisi, A.; Akbarizadeh, G.; Mahmoudi, A.: Combined method of an efficient cuckoo search algorithm and nonnegative matrix factorization of different zernike moment features for discrimination between oil spills and lookalikes in SAR images. IEEE J. Selected Topics Appl. Earth Obs. Remote Sens. 11(11), 4193–4205 (2018) Raeisi, A.; Akbarizadeh, G.; Mahmoudi, A.: Combined method of an efficient cuckoo search algorithm and nonnegative matrix factorization of different zernike moment features for discrimination between oil spills and lookalikes in SAR images. IEEE J. Selected Topics Appl. Earth Obs. Remote Sens. 11(11), 4193–4205 (2018)
40.
go back to reference Akbarizadeh, G.: A new statistical-based kurtosis wavelet energy feature for texture recognition of SAR images. IEEE Trans. Geosci. Remote Sens. 50(11), 4358–4368 (2012) Akbarizadeh, G.: A new statistical-based kurtosis wavelet energy feature for texture recognition of SAR images. IEEE Trans. Geosci. Remote Sens. 50(11), 4358–4368 (2012)
41.
go back to reference Modava, M.; Akbarizadeh, G.; Soroosh, M.: Integration of spectral histogram and level set for coastline detection in SAR images. IEEE Trans. Aerosp. Electron. Syst. 55(2), 810–819 (2019) Modava, M.; Akbarizadeh, G.; Soroosh, M.: Integration of spectral histogram and level set for coastline detection in SAR images. IEEE Trans. Aerosp. Electron. Syst. 55(2), 810–819 (2019)
42.
go back to reference Belkin, M.; Nigoyi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: NIPS’01 Proceedings of the 14th International Conference on Neural Information Processing Systems: Natural and Synthetic, pp. 585–591 (2001) Belkin, M.; Nigoyi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: NIPS’01 Proceedings of the 14th International Conference on Neural Information Processing Systems: Natural and Synthetic, pp. 585–591 (2001)
43.
go back to reference Allab, K.; Labiod, L.; Nadif, M.: Simultaneous spectral data embedding and clustering. IEEE Trans. Neural Netw. Learn. Syst. 29(12), 6396–6401 (2018)MathSciNet Allab, K.; Labiod, L.; Nadif, M.: Simultaneous spectral data embedding and clustering. IEEE Trans. Neural Netw. Learn. Syst. 29(12), 6396–6401 (2018)MathSciNet
44.
go back to reference Rezvanian, A.; Saghiri, A.M.; Vahidipour, S.M.; Esnaashari, M.; Meybodi, M.R.: Recent advances in learning automata. Studies in Computational Intelligence, vol. 754, chapter Cellular Learning Automata. Sprimger Cham (2018) Rezvanian, A.; Saghiri, A.M.; Vahidipour, S.M.; Esnaashari, M.; Meybodi, M.R.: Recent advances in learning automata. Studies in Computational Intelligence, vol. 754, chapter Cellular Learning Automata. Sprimger Cham (2018)
45.
go back to reference Abin, A.; Fotouhi, M.; Kasaei, S.: Cellular learning automata-based color image segmentation using adaptive chains. In: 14th International CSI Computer Conference (2009) Abin, A.; Fotouhi, M.; Kasaei, S.: Cellular learning automata-based color image segmentation using adaptive chains. In: 14th International CSI Computer Conference (2009)
46.
go back to reference Noda, H.; Spaulding, J.; Shirazi, M.N.; Kawaguchi, E.: Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process. Lett. 9(12), 410–413 (2002) Noda, H.; Spaulding, J.; Shirazi, M.N.; Kawaguchi, E.: Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process. Lett. 9(12), 410–413 (2002)
47.
go back to reference Wu, D.C.; Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit Lett. 24, 1613–1626 (2003)MATH Wu, D.C.; Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognit Lett. 24, 1613–1626 (2003)MATH
48.
go back to reference Lou, D.C., Liu, J.L., Hu, M.C.: Adaptive digital watermarking using neural network clustering technique. In: 16th IPPR Conference on Computer Vision, Graphics and Image Processing, pp. 325–332 (2003) Lou, D.C., Liu, J.L., Hu, M.C.: Adaptive digital watermarking using neural network clustering technique. In: 16th IPPR Conference on Computer Vision, Graphics and Image Processing, pp. 325–332 (2003)
49.
go back to reference Huang, S.; Zhang, W.: Digital watermarking based on neural network and image features. In: 2nd International Conference on Information and Computing Science (2009) Huang, S.; Zhang, W.: Digital watermarking based on neural network and image features. In: 2nd International Conference on Information and Computing Science (2009)
50.
go back to reference Anees, A.; Siddiqui, A.M.; Ahmed, J.; Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75, 807–816 (2014) Anees, A.; Siddiqui, A.M.; Ahmed, J.; Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75, 807–816 (2014)
51.
go back to reference Krishnagopal, S.; Pratap, S.; Prakash, B.: Proceedings of Fourth International Conference on Image encryption and steganography using chaotic maps with a double key protection. In: Das, Kedar Nath, Deep, Kusum, Pant, Millie, Bansal, Jagdish Chand, Nagar, Atulya (eds.) Soft Computing for Problem Solving, pp. 67–78. Springer India, New Delhi (2015) Krishnagopal, S.; Pratap, S.; Prakash, B.: Proceedings of Fourth International Conference on Image encryption and steganography using chaotic maps with a double key protection. In: Das, Kedar Nath, Deep, Kusum, Pant, Millie, Bansal, Jagdish Chand, Nagar, Atulya (eds.) Soft Computing for Problem Solving, pp. 67–78. Springer India, New Delhi (2015)
52.
go back to reference Yang, D.; Liu, Z.; Zhou, J.: Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimization. Commun. Nonlinear Sci. Numer. Simul. 19(4), 1229–1246 (2014)MathSciNetMATH Yang, D.; Liu, Z.; Zhou, J.: Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimization. Commun. Nonlinear Sci. Numer. Simul. 19(4), 1229–1246 (2014)MathSciNetMATH
53.
go back to reference Palacios-Luengas, L.; Delgado-Gutierrez, G.; Diaz-Mendez, J.A.; Vazquez-Medina, R.: Symmetric cryptosystem based on skew tent map. Multimed. Tools Appl. 77(2), 2739–2770 (2018) Palacios-Luengas, L.; Delgado-Gutierrez, G.; Diaz-Mendez, J.A.; Vazquez-Medina, R.: Symmetric cryptosystem based on skew tent map. Multimed. Tools Appl. 77(2), 2739–2770 (2018)
54.
go back to reference Kartalopoulos, S.V.: Annulling traps and fixed traps in chaos cryptography. New Technologies, Mobility and Security, pp. 1–4 (2008) Kartalopoulos, S.V.: Annulling traps and fixed traps in chaos cryptography. New Technologies, Mobility and Security, pp. 1–4 (2008)
55.
go back to reference Channalli, S.; Jadhav, A.: Steganography: an art of hiding data. Int. J. Comput. Sci. Eng. 1(3), 137–141 (2009) Channalli, S.; Jadhav, A.: Steganography: an art of hiding data. Int. J. Comput. Sci. Eng. 1(3), 137–141 (2009)
56.
go back to reference Tian, H.; Wu, Y.; Chang, C.-C.; Huang, Y.; Chen, Y.; Wang, T.; Cai, Y.; Liu, J.: Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134, 9–22 (2017) Tian, H.; Wu, Y.; Chang, C.-C.; Huang, Y.; Chen, Y.; Wang, T.; Cai, Y.; Liu, J.: Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134, 9–22 (2017)
57.
go back to reference Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires, IX:5–38 (1883) Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires, IX:5–38 (1883)
58.
go back to reference Oliva, A.; Torralba, A.: Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. J. Comput. Vis. 42(3), 145–175 (2001)MATH Oliva, A.; Torralba, A.: Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. J. Comput. Vis. 42(3), 145–175 (2001)MATH
59.
go back to reference Haralick, R.M.; Shanmugam, K.; Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC–3(6), 610–621 (1973) Haralick, R.M.; Shanmugam, K.; Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC–3(6), 610–621 (1973)
60.
go back to reference Hall-Beyer, M.: GLCM texture: A tutorial. Technical report, University of Calgary (2007) Hall-Beyer, M.: GLCM texture: A tutorial. Technical report, University of Calgary (2007)
61.
go back to reference Kaur, A.; Kaur, L.; Gupta, S.: Image recognition using coefficient of correlation and Structural SIMilarity Index in uncontrolled environment. Int. J. Comput. Appl. 59(5), 32–39 (2012) Kaur, A.; Kaur, L.; Gupta, S.: Image recognition using coefficient of correlation and Structural SIMilarity Index in uncontrolled environment. Int. J. Comput. Appl. 59(5), 32–39 (2012)
62.
go back to reference Sara, U.; Akter, M.; Uddin, M.S.: Image quality assessment through FSIM, SSIM, MSE and PSNR–A comparative study. J. Comput. Commun. 7, 8–18 (2019) Sara, U.; Akter, M.; Uddin, M.S.: Image quality assessment through FSIM, SSIM, MSE and PSNR–A comparative study. J. Comput. Commun. 7, 8–18 (2019)
63.
go back to reference Joshi, K.; Yadav, R.: New approach toward data hiding using XOR for image steganography. In: 2016 Ninth International Conference on Contemporary Computing (IC3), pp. 1–6 (2016) Joshi, K.; Yadav, R.: New approach toward data hiding using XOR for image steganography. In: 2016 Ninth International Conference on Contemporary Computing (IC3), pp. 1–6 (2016)
64.
go back to reference Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004) Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
65.
go back to reference Kovesi, P.: Image features from phase congruency. Videre J. Comput. Vis. Res. 1(3), 1–26 (1999) Kovesi, P.: Image features from phase congruency. Videre J. Comput. Vis. Res. 1(3), 1–26 (1999)
66.
go back to reference Zhang, L.; Zhang, L.; Mou, X.; Zhang, D.: FSIM: a feature similarity index for image quality assessment. IEEE Trans. Image Process. 20(8), 2378–2386 (2011)MathSciNetMATH Zhang, L.; Zhang, L.; Mou, X.; Zhang, D.: FSIM: a feature similarity index for image quality assessment. IEEE Trans. Image Process. 20(8), 2378–2386 (2011)MathSciNetMATH
67.
go back to reference Jain, Ramesh; Kasturi, Rangachar; Schunck, Brian G.: Mach. Vis. McGraw-Hill Inc, New York (1995) Jain, Ramesh; Kasturi, Rangachar; Schunck, Brian G.: Mach. Vis. McGraw-Hill Inc, New York (1995)
68.
go back to reference Jähne, B.; Haubecker, H.; Geibler, P.: Handbook of Computer Vision and Applications. Academic Press, Cambridge (1999) Jähne, B.; Haubecker, H.; Geibler, P.: Handbook of Computer Vision and Applications. Academic Press, Cambridge (1999)
69.
go back to reference Zhang, L.; Shen, Y.; Li, H.: VSI: a visual saliency-induced index for perceptual image quality assessment. IEEE Trans. Image Process. 23(10), 4270–4281 (2014)MathSciNetMATH Zhang, L.; Shen, Y.; Li, H.: VSI: a visual saliency-induced index for perceptual image quality assessment. IEEE Trans. Image Process. 23(10), 4270–4281 (2014)MathSciNetMATH
70.
go back to reference Shanmuga-Vadivu, P.; Sumathy, P.; Vadivel, A.: FOSIR: fuzzy-object-shape for image retrieval applications. Neurocomputing 171, 719–735 (2016) Shanmuga-Vadivu, P.; Sumathy, P.; Vadivel, A.: FOSIR: fuzzy-object-shape for image retrieval applications. Neurocomputing 171, 719–735 (2016)
71.
go back to reference Canario, N.; Jorge, L.; Loureiro-Silva, M.F.; Soares, M.A.; Castelo-Branco, M.: Distinct preference for spatial frequency content in ventral stream regions underlying the recognition of scenes, faces, bodies and other objects. Neuropsychologia 87, 110–119 (2016) Canario, N.; Jorge, L.; Loureiro-Silva, M.F.; Soares, M.A.; Castelo-Branco, M.: Distinct preference for spatial frequency content in ventral stream regions underlying the recognition of scenes, faces, bodies and other objects. Neuropsychologia 87, 110–119 (2016)
72.
go back to reference Evans, K.; Baddeley, A.: Intention, attention and long-term memory for visual scenes: It all depends on the scenes. Cognition 180, 24–37 (2018) Evans, K.; Baddeley, A.: Intention, attention and long-term memory for visual scenes: It all depends on the scenes. Cognition 180, 24–37 (2018)
73.
go back to reference Zhang, R.; Isola, P.; Efros, A. A.; Shechtman, E.; Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 586–595 (2018) Zhang, R.; Isola, P.; Efros, A. A.; Shechtman, E.; Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 586–595 (2018)
74.
go back to reference Dumitrescu, S.; Wu, X.; Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51(7), 1995–2007 (2003)MATH Dumitrescu, S.; Wu, X.; Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51(7), 1995–2007 (2003)MATH
75.
go back to reference Fridrich, J.; Goljan, M.; Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 27–30. ACM New York (2001) Fridrich, J.; Goljan, M.; Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 27–30. ACM New York (2001)
76.
go back to reference Westfeld, A.; Pfitzmann, A.: Information hiding. In: Pfitzmann (ed.) chapter Attacks on steganographic systems, pp. 61–76. Springer (2000) Westfeld, A.; Pfitzmann, A.: Information hiding. In: Pfitzmann (ed.) chapter Attacks on steganographic systems, pp. 61–76. Springer (2000)
77.
go back to reference Dumitrescu, S.; Wu, X.; Nemon, N.: On steganalysis of random LSB embedding in continuous-tone images. In: IEEE International Conference on Image Processing, vol. 3, pp. 641–644 (2002) Dumitrescu, S.; Wu, X.; Nemon, N.: On steganalysis of random LSB embedding in continuous-tone images. In: IEEE International Conference on Image Processing, vol. 3, pp. 641–644 (2002)
78.
go back to reference Chorein, A.: SilentEye 0. 4. 1. Technical report, Knowm Inc (2014) Chorein, A.: SilentEye 0. 4. 1. Technical report, Knowm Inc (2014)
79.
go back to reference Vaidya, S.: OpenStego 0.6.1. Technical report, SourceForge (2015) Vaidya, S.: OpenStego 0.6.1. Technical report, SourceForge (2015)
80.
go back to reference EmbeddedSW. OpenPuff 4.0.1. Technical report, Embedded SW (2018) EmbeddedSW. OpenPuff 4.0.1. Technical report, Embedded SW (2018)
Metadata
Title
LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map
Authors
J. L. Pichardo-Méndez
L. Palacios-Luengas
R. F. Martínez-González
O. Jiménez-Ramírez
R. Vázquez-Medina
Publication date
04-12-2019
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 4/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-019-04272-0

Other articles of this Issue 4/2020

Arabian Journal for Science and Engineering 4/2020 Go to the issue

RESEARCH ARTICLE - SPECIAL ISSUE - INTELLIGENT COMPUTING and INTERDISCIPLINARY APPLICATIONS

A Comparative Analysis on Effort Estimation for Agile and Non-agile Software Projects Using DBN-ALO

Research Article - Computer Engineering and Computer Science

A Novel Short Text Clustering Model Based on Grey System Theory

Research Article-Computer Engineering and Computer Science

Shortest Path Computation in a Network with Multiple Destinations

Research Article - Special Issue - Intelligent Computing And Interdisciplinary Applications

An Integrated Word Embedding-Based Dual-Task Learning Method for Sentiment Analysis

Premium Partners