A Multiplicative-Additive Chaotic-Address Steganography

Haneen H. Alwan, Zahir M. Hussain
{"title":"A Multiplicative-Additive Chaotic-Address Steganography","authors":"Haneen H. Alwan, Zahir M. Hussain","doi":"10.31642/jokmc/2018/070204","DOIUrl":null,"url":null,"abstract":"In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the \nchaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are \nintroduced for image steganography in the spatial domain. The first system is based on the well-known LSB \ntechnique, the second system is based on looking for the identical bits between the secret message and the cover \nimage and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits \nwith cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak \nSignal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the \nChaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results \nshow that the proposed methods perform better than existed systems.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Kufa for Mathematics and Computer","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31642/jokmc/2018/070204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the chaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are introduced for image steganography in the spatial domain. The first system is based on the well-known LSB technique, the second system is based on looking for the identical bits between the secret message and the cover image and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits with cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the Chaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results show that the proposed methods perform better than existed systems.
一种乘加性混沌地址隐写技术
本研究采用乘加形式合并多重混沌映射,生成用于隐写术中跟踪打乱位地址的混沌序列。介绍了空间域图像隐写的三种技术。第一个系统是基于众所周知的LSB技术,第二个系统是基于寻找秘密信息和封面图像之间相同的比特,第三个系统是基于LSB替代的概念,它采用了秘密数据比特与封面像素比特的映射。通过峰值信噪比(PSNR)、均方误差(MSE)、直方图分析和相关分析对所提出技术的安全水平进行了测试和评估,并使用相关性、lyypaunov指数、poincar截面和0-1Test对所生成的混沌序列进行了测试。结果表明,所提方法的性能优于现有系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信