Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: http://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2015, 3(1), 8-14
DOI: 10.12691/iscf-3-1-2
Open AccessArticle

Novel Chaos Based Steganography for Images Using Matrix Encoding and Cat Mapping Techniques

V. Lokeswara Reddy1,

1Department of CSE K.S.R.M College of Engineering Kadapa, Y.S.R. District., A.P., India

Pub. Date: July 22, 2015

Cite this paper:
V. Lokeswara Reddy. Novel Chaos Based Steganography for Images Using Matrix Encoding and Cat Mapping Techniques. Information Security and Computer Fraud. 2015; 3(1):8-14. doi: 10.12691/iscf-3-1-2

Abstract

Steganography is an ancient technique of data hiding. Steganography is a technique in which secret data is hidden into vessel image without any suspicion. Most of the traditional approaches are achieving limited data hiding. To expand the information covering up proposed mechanism uses various techniques. Proposed mechanism is increasing the info disappearing ability and also provides high imperceptibility towards steganalysis. The key goal connected with steganography is usually providing the protection for hidden information from adversary. The integrity and confidentiality of the electronic information offers occur underneath immense hazard. Steganography will be the art along with technology associated with coated composing. Steganography utilizes text, pictures, audio tracks, video etc. as being a protect moderate. The proposed mechanism is based on image steganography technique. It is implemented based on the Canny Edge Detection. Pixel positions of edges in conjunction with Chaotic Cat Mapping [10] are used for the steganography technique. Proposed mechanism is using edge adaptive image steganography [3] by combining the benefits of matrix encoding and LSBM [8,9].

Keywords:
payload chaotic cat mapping matrix encoding LSB Matching Regions of Interests (ROI) edge detection image steganography

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

Figures

Figure of 11

References:

[1]  John Shrewd, “A computational way to deal with edge identification”, IEEE Exchanges on pattern analysis and Machine Intelligence, Vol. 8, No. 6, pp.679-698, Nov. 198.
 
[2]  Ron Crandall, “Some Notes on Steganography”, Posted on Steganography Mailing List, 1998. Source: http://www.dia.unisa.it/~ads/corsosecurity/ www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf
 
[3]  Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010, pp. 201-214.
 
[4]  Grant Kelly, Bruce McKenzie, “Security, privacy and confidentiality issues on the internet”, Source: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937.
 
[5]  C.V. Serdean, M. Tomlinson, J. Wade, A.M. Ambroze, “Protecting Intellectual Rights: Digital Watermarking in the wavelet domain”, IEEE Int. Workshop Trends and Recent Achievements in IT, pp. 16-18, 2002.
 
[6]  Ratnakirti Roya,*, Anirban Sarkara, Suvamoy Changdera, “Chaos based Edge Adaptive Image Steganography”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013.
 
[7]  Qian-chuan Zhong, Qing-xin Zhu , Ping-Li Zhang , “A Spatial Domain Color Watermarking Scheme based on Chaos”, International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 137-142, 2008.
 
[8]  X. Li, B. Yang, D. Cheng, and T. Zeng, “A generalization of lsb matching”, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009.
 
[9]  R. L. Tataru, D. Battikh, S. El Assad, H. Noura, O. Deforges, “Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences”, Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 85-88, 2012.
 
[10]  Sahar Mazloom, Amir-Masud Eftekhari-Moghadam, “Color Image Cryptosystem using Chaotic Maps”, IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing, pp. 142-147, 2011.
 
[11]  Chen Wei-bin, Zhang Xin, “Image Encryption Algorithm based on Henon Chaotic System”, International Conference on Image Analysis and Signal Processing (IASP), pp. 94-97, 2009.