Skip to main content
Top
Published in: Wireless Personal Communications 3/2016

15-11-2016

Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering

Authors: Sabry S. Nassar, Nabil M. Ayad, Hamdy M. Kelash, Hala S. El-sayed, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah

Published in: Wireless Personal Communications | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The popularity of wireless multimedia applications in real life and the open nature of wireless media for access make the security of confidential multimedia over wireless channels a major task. This paper proposes a two multi-layer security algorithm using steganography with encryption that strengthens the image security through its transmission over a wireless channel. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The suitability of image as a cover medium is due to abundance of redundant bits, and bulk data capacity. The chaos based encryption algorithms are adopted in this paper. In this work a confidential image is embedded into a cover image using least significant bit steganography, and then the output stego image is encrypted using a 2-D Logistic map or 2-D chaotic Baker map. The encrypted stego image is then transmitted over a wireless AWGN channel and the reverse processes are implemented to extract the received secret image. Several experiments have been carried out to examine the suitability of the proposed algorithms for securing high sensitivity images through transmission over wireless channels at different noise levels.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. In IEEE-0-7803-9588-3/05/$20.00 ©2005. Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. In IEEE-0-7803-9588-3/05/$20.00 ©2005.
2.
go back to reference Neeta, D., Wagh, K. K., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. In 1st international conference on digital information management (pp. 173–178). Neeta, D., Wagh, K. K., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. In 1st international conference on digital information management (pp. 173–178).
3.
go back to reference Juneja, M., & Sandhu, P. S. (2009). Designing of robust image steganography technique based on LSB insertion and encryption. In International conference on advances in recent technologies in communication and computing. Juneja, M., & Sandhu, P. S. (2009). Designing of robust image steganography technique based on LSB insertion and encryption. In International conference on advances in recent technologies in communication and computing.
4.
go back to reference Chen, G. R., Mao, Y. B., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat map. Chaos, Solitons & Fractals, 21, 749–761.MathSciNetCrossRefMATH Chen, G. R., Mao, Y. B., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat map. Chaos, Solitons & Fractals, 21, 749–761.MathSciNetCrossRefMATH
5.
go back to reference Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.CrossRef Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.CrossRef
6.
go back to reference Arun, A. S., & Joseph, G. M. (2013). High security cryptographic technique using steganography and chaotic image encryption. IOSR Journal of Computer Engineering, 12(5), 49–54.CrossRef Arun, A. S., & Joseph, G. M. (2013). High security cryptographic technique using steganography and chaotic image encryption. IOSR Journal of Computer Engineering, 12(5), 49–54.CrossRef
7.
go back to reference Mehta, A. M., Lanzisera, S., & Pister, K. S. J. (2008). Steganography in 802.15.4 wireless communication. In 2nd international symposium on advanced networks and telecommunication systems, ANTS. Mehta, A. M., Lanzisera, S., & Pister, K. S. J. (2008). Steganography in 802.15.4 wireless communication. In 2nd international symposium on advanced networks and telecommunication systems, ANTS.
8.
go back to reference Choudhary, K. (2012). Image steganography and global terrorism. Global Security Studies, 3(4), 115–135. Choudhary, K. (2012). Image steganography and global terrorism. Global Security Studies, 3(4), 115–135.
9.
go back to reference Kamal, A. H. M. (2013). Steganography: Securing message in wireless network. International Journal of Computers & Technology, 4(3), 797–801. Kamal, A. H. M. (2013). Steganography: Securing message in wireless network. International Journal of Computers & Technology, 4(3), 797–801.
10.
go back to reference Owens, M. (2002). A discussion of covert channels and steganography. Bethesda, MD: SANS Institute. Owens, M. (2002). A discussion of covert channels and steganography. Bethesda, MD: SANS Institute.
11.
go back to reference Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer Journal, 31(2), 26–34.CrossRef Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer Journal, 31(2), 26–34.CrossRef
12.
go back to reference Chen M., Zhang, R., Niu, X., & Yang Y. (2006). Analysis of current steganography tools: Classifications & features. In International conference on intelligent information hiding and multimedia signal processing (IIH-MSP’06), IEEE-0-7695-2745-0/06 $20.00 © 2006. Chen M., Zhang, R., Niu, X., & Yang Y. (2006). Analysis of current steganography tools: Classifications & features. In International conference on intelligent information hiding and multimedia signal processing (IIH-MSP’06), IEEE-0-7695-2745-0/06 $20.00 © 2006.
13.
go back to reference Stuti, G., Rana, A., & Kaur, M. (2013). Comparison of image steganography techniques. International Journal of Computers and Distributed Systems, 3(I), 20–30. Stuti, G., Rana, A., & Kaur, M. (2013). Comparison of image steganography techniques. International Journal of Computers and Distributed Systems, 3(I), 20–30.
14.
go back to reference Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Science Direct, Image and Vision Computing, 24, 926–934.CrossRef Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Science Direct, Image and Vision Computing, 24, 926–934.CrossRef
15.
go back to reference Srividya, G., Nandakumar, P. (2011). A Triple-Key chaotic image encryption method. In 2011 international conference on communications and signal processing (ICCSP) (pp. 266–270). Srividya, G., Nandakumar, P. (2011). A Triple-Key chaotic image encryption method. In 2011 international conference on communications and signal processing (ICCSP) (pp. 266–270).
16.
go back to reference Ahmad, M., & Alam, M. S. (2009). A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering, 2(1), 46–50. Ahmad, M., & Alam, M. S. (2009). A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering, 2(1), 46–50.
17.
go back to reference Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8, 1259–1284.MathSciNetCrossRefMATH Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8, 1259–1284.MathSciNetCrossRefMATH
18.
go back to reference El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 4. doi:10.1186/1687-4722-2012-4.CrossRef El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 4. doi:10.​1186/​1687-4722-2012-4.CrossRef
19.
go back to reference Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM. Wireless Personal Communications, 79(3), 2141–2154.CrossRef Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM. Wireless Personal Communications, 79(3), 2141–2154.CrossRef
20.
go back to reference Silva, E. A., Panetta, K., Agaian, S. S. (2007). Quantifying image similarity using measure of enhancement by entropy. In SPIE proceedings Vol. 6579, mobile multimedia/image processing for military and security applications. Silva, E. A., Panetta, K., Agaian, S. S. (2007). Quantifying image similarity using measure of enhancement by entropy. In SPIE proceedings Vol. 6579, mobile multimedia/image processing for military and security applications.
Metadata
Title
Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering
Authors
Sabry S. Nassar
Nabil M. Ayad
Hamdy M. Kelash
Hala S. El-sayed
Mohsen A. M. El-Bendary
Fathi E. Abd El-Samie
Osama S. Faragallah
Publication date
15-11-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2016
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3387-5

Other articles of this Issue 3/2016

Wireless Personal Communications 3/2016 Go to the issue