Abstract

Image encryption and steganography techniques are receiving a lot of interest and investigations due to their high importance in multimedia communication systems. A novel highly efficient image encryption and steganography technique are presented in this paper. For the first time, the proposed technique uses hybrid DNA encoding and Choquet's Fuzzy Integral sequences. At first, a confused version of the image, using a simple chaotic map, is encoded using DNA's bases. Four coded images are generated using the four DNA bases, namely AT, CG, GC, and TA. Parallel to that, a Choquet's fuzzy Integral sequence is generated and DNA encoded similarly to obtain four pseudo-random sequences. Secondly, the resulting four fuzzy/DNA sequences are used to diffuse the four DNA encoded images using the complementary DNA XOR rule, according to certain control code. Finally, the wavelet fusion algorithm is then used to fuse the resulting four fuzzy-DNA encoded images, to get the encrypted image. For added security, a new steganography approach is used. In particular, the encrypted image is divided into four sub-images, each of which is hidden in a different carrier image selected from a known group of carrier images according to a given key. The simulation results and security analysis confirmed the efficiency of the proposed image encryption algorithm as well as the steganography approach used for enhanced security. Ten different images with a size of 256 x 256 are used to test the proposed method. The results show that the proposed algorithm has a higher key sensitivity. The pixel correlation coefficient values are very small (between 5.3220e-04 and 0.0011 horizontally, between 8.7670e-04 and 0.0022 vertically and between 0.0002 and 0.0045 diagonally). Furthermore, the measured information entropy of the encrypted images is between 7.9970 and 7.9979 which are very close to the ideal value of 8. Additionally, the measured unified average changing intensity and number of pixels change rate values take the values between 33.46 and 33.39 and between 99.61 and 99.64, respectively, which are again closed to the ideal values. The steganography test shows that the hidden encrypted images are almost invisible at high values of SNR and are characterized by good NCC values under different types of attacks. The performance of the new proposed algorithm is proved to overcomes many other previously published image encryption techniques.

Highlights

  • There has been a quantum leap in the last few years in the fields of digital communication and networking technologies

  • Step 5: ‘‘After the encryption process described in the previous step, the encrypted image is hidden into a group of carriers imaged using the integer wavelet transform (IWT) technique [14], [15]

  • In the adopted steganography technique, the encrypted image is divided into four sub-images, each of which is hidden in a different carrier image selected from a known group of carrier images according to a given key

Read more

Summary

INTRODUCTION

There has been a quantum leap in the last few years in the fields of digital communication and networking technologies. A stego file is the result of a file that includes hidden information, using one of the following strategies: Least Significant Bit (LSB), Discrete Cosine Transform, (DCT) and Discrete Wavelet Transform (DWT) [12]–[15] Even though both cryptography and steganography provide good security, there have been attempts to merge them into one method that has good good concealment and high security.

RELATED WORK
SUGENO λ MEASURE
BIOLOGICAL BACKGROUND OF DNA
THE PROPOSED CRYPTOSYSTEM
EXPERIMENTAL RESULTS
IMPERCEPTIBILITY TEST
STRUCTURE SIMILARITY INDEX ANALYSIS OF
ROBUSTNESS TEST
CONCLUSION
FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call