{"title":"A Multiplicative-Additive Chaotic-Address Steganography","authors":"Haneen H. Alwan, Zahir M. Hussain","doi":"10.31642/jokmc/2018/070204","DOIUrl":null,"url":null,"abstract":"In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the \nchaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are \nintroduced for image steganography in the spatial domain. The first system is based on the well-known LSB \ntechnique, the second system is based on looking for the identical bits between the secret message and the cover \nimage and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits \nwith cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak \nSignal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the \nChaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results \nshow that the proposed methods perform better than existed systems.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Kufa for Mathematics and Computer","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31642/jokmc/2018/070204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to generate the
chaotic sequences which are used to track the addresses of shuffled bits in steganography. Three techniques are
introduced for image steganography in the spatial domain. The first system is based on the well-known LSB
technique, the second system is based on looking for the identical bits between the secret message and the cover
image and the third system is based on the concept of LSB substitution, it is employed the mapping of secret data bits
with cover pixel bits. It was tested and evaluated security levels for the proposed techniques by using the Peak
Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis and tested the
Chaotic sequences generated by using correlation, Lypaunov exponents, Poincaré section and 0-1Test. The results
show that the proposed methods perform better than existed systems.