Skip to main content
Log in

A technique for digital steganography using chaotic maps

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Chaos has been applied extensively in secure communication over the last decade, but most of the chaotic security protocols defined, are cryptographically weak or slow to compute. Also, study of chaotic phenomena as application in security area is not discussed in detail. In this paper, we have intensely studied chaos, their influence in secure communications and proposed a steganography technique in spatial domain for digital images based upon chaotic maps. By applying chaos effectively in secure communication, the strength of the overall anticipated algorithm has been increased to a significant level. In addition, few security statistical analyses such as correlation, entropy, energy, contrast, homogeneity, peak signal to noise ratio, and mean square error have also been carried out and shown that it can survive against various differential attacks such as the known message attack, known cover attack, known stego attack, and stego only attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  2. Judge, J.C.: Steganography: past, present, future. SANS Institute publication. http://www.sans.org/reading-room/whitepapers/stenganography/552.php (2001)

  3. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)

    Article  Google Scholar 

  4. Sadkhan, S.B.: Cryptography: current status and future trends. In: Proceedings of IEEE, International Conference on Information & Communication Technologies: From Theory to Applications, Damascus, Syria, pp. 417–418 (2004)

    Google Scholar 

  5. Moulin, P., Koetter, R.: Data-hiding codes. Proc. IEEE 93(12), 2083–2126 (2005)

    Article  Google Scholar 

  6. Yang, T., Wu, C.W., Chua, L.O.: Cryptography based on chaotic systems. IEEE Trans. Circuits Syst. I 44(5), 469–472 (1997)

    Article  MATH  Google Scholar 

  7. Verhulst, P.F.: Recherches mathématiques sur la loi d’accroissement de la population. Nouv. Mem. Acad. R. Sci. B.-Lett. Brux. 18, 1–41 (1845)

    Google Scholar 

  8. May, R.M.: Biological populations with nonoverlapping generations, stable points, stable cycles, and chaos. Science 186, 645–647 (1974)

    Article  Google Scholar 

  9. May, R.M.: Biological populations obeying difference equations, stable points, stable cycles, and chaos. J. Theor. Biol. 51(2), 511–524 (1975)

    Article  Google Scholar 

  10. May, R.M.: Simple mathematical models with very complicated dynamics. Nature 261, 459–467 (1976)

    Article  Google Scholar 

  11. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393–399 (2006)

    Article  MATH  Google Scholar 

  12. Sheng, L.-Y., Sun, K.-H., Li, C.-B.: Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties. Acta Phys. Sin. 53(9), 2871–2876 (2004)

    Google Scholar 

  13. Sheng, L.-Y., Cao, L.-l., Sun, K.-h., Wen, J.: Pseudo-random number generator based on TD-ERCS chaos and its statistic characteristics analysis. Acta Phys. Sin. 54(9), 4031–4037 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Anees.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Anees, A., Siddiqui, A.M., Ahmed, J. et al. A technique for digital steganography using chaotic maps. Nonlinear Dyn 75, 807–816 (2014). https://doi.org/10.1007/s11071-013-1105-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-013-1105-3

Keywords

Navigation