{"title":"一种新的混沌图像隐写技术","authors":"A. Ghidan, Samar M. Ismail","doi":"10.1109/NILES.2019.8909295","DOIUrl":null,"url":null,"abstract":"In this paper, a lossy image steganography technique is introduced following the least significant bits method. Two chaotic maps are used for randomly selecting the cover image’s pixels to hide the message image. Generalized chaotic maps are used for adding extra degrees of freedom in designing the pseudorandom numbers used for pixels’ position selection rendering better security level. The chaotic maps used are the generalized logistic map and the delayed logistic map. Different image sets are employed for method validation. The Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Image Fidelity (IF) as well as the capacity of the cover image are calculated as security metrics to ensure the high efficiency of the proposed technique compared to other works in literature.","PeriodicalId":330822,"journal":{"name":"2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel Chaotic Image Steganography Technique\",\"authors\":\"A. Ghidan, Samar M. Ismail\",\"doi\":\"10.1109/NILES.2019.8909295\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a lossy image steganography technique is introduced following the least significant bits method. Two chaotic maps are used for randomly selecting the cover image’s pixels to hide the message image. Generalized chaotic maps are used for adding extra degrees of freedom in designing the pseudorandom numbers used for pixels’ position selection rendering better security level. The chaotic maps used are the generalized logistic map and the delayed logistic map. Different image sets are employed for method validation. The Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Image Fidelity (IF) as well as the capacity of the cover image are calculated as security metrics to ensure the high efficiency of the proposed technique compared to other works in literature.\",\"PeriodicalId\":330822,\"journal\":{\"name\":\"2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NILES.2019.8909295\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NILES.2019.8909295","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, a lossy image steganography technique is introduced following the least significant bits method. Two chaotic maps are used for randomly selecting the cover image’s pixels to hide the message image. Generalized chaotic maps are used for adding extra degrees of freedom in designing the pseudorandom numbers used for pixels’ position selection rendering better security level. The chaotic maps used are the generalized logistic map and the delayed logistic map. Different image sets are employed for method validation. The Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Image Fidelity (IF) as well as the capacity of the cover image are calculated as security metrics to ensure the high efficiency of the proposed technique compared to other works in literature.