Ta Thi Kim Hue, N. T. Linh, Minh Nguyen-Duc, T. Hoang
{"title":"Data Hiding in Bit-plane Medical Image Using Chaos-based Steganography","authors":"Ta Thi Kim Hue, N. T. Linh, Minh Nguyen-Duc, T. Hoang","doi":"10.1109/MAPR53640.2021.9585243","DOIUrl":null,"url":null,"abstract":"This paper proposes digital medical image steganographic schemes based on chaotic maps. Logistic and Cat maps are applied to choose positions of the embedded bits in cover images where the bits of the secret message will be hidden. Our schemes provide mutual substitution methods in a chaotic manner in order to choose pseudo-random positions. Three spatial steganographic algorithms are respectively called ISLM, ISCM and ISLCM using insertion methodology that provides a large embedding capacity and imperceptible steganographic image. The combination of a Logistic map and a Cat map is appropriate for the inserted message becoming secure against message recovery attacks. Those are efficient schemes with a high level of security requirements.","PeriodicalId":233540,"journal":{"name":"2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MAPR53640.2021.9585243","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper proposes digital medical image steganographic schemes based on chaotic maps. Logistic and Cat maps are applied to choose positions of the embedded bits in cover images where the bits of the secret message will be hidden. Our schemes provide mutual substitution methods in a chaotic manner in order to choose pseudo-random positions. Three spatial steganographic algorithms are respectively called ISLM, ISCM and ISLCM using insertion methodology that provides a large embedding capacity and imperceptible steganographic image. The combination of a Logistic map and a Cat map is appropriate for the inserted message becoming secure against message recovery attacks. Those are efficient schemes with a high level of security requirements.