Abstract

In this paper, a combination of spatial domain as well as transformation domain with the aid of chaotic sequences is used to propose an efficient steganography scheme for color images. The transform domain uses Discrete Wavelet Transform (DWT) for embedding the cover and secret images. Chaotic sequences are used for two purposes: first, to scramble the secret color image before hiding. Second, to randomly select the locations of the cover image for embedding. The two images are then merged together into a single image and the stego image is formed by applying IDWT. The secret image is extracted from the stego image without the need to the original cover image. The simulation results are evaluated in terms of Mean Square Error (MSE), correlation, and Peak Signal to Noise Ratio (PSNR) demonstrate that the proposed scheme has better robustness than the previous schemes in the literature in the presence of common image attacks including filtering and noise attacks. The obtained results for maximum PSNR and correlation were 76.8 dB and 99.99% for the stego image while for the extracted secret image were 55.4 dB and 100%.

Highlights

  • With the rapid growth of internet networks and technologies, the demand for information security is highly increased

  • A Chaotic sequence is used to encrypt the secret image by applying spatial domain (LSB) and frequency domain stegnography (DWT) before embedding the information into the color cover image

  • By the Mean Square Error (MSE) which demonstrate the difference between stego and cover the images

Read more

Summary

INTRODUCTION

With the rapid growth of internet networks and technologies, the demand for information security is highly increased. A Chaotic sequence is used to encrypt the secret image by applying spatial domain (LSB) and frequency domain stegnography (DWT) before embedding the information into the color cover image. An efficient steganography scheme based on the combination of both spatial domain and transform domain (DWT) is proposed This approach is used to improve the image steganography in terms of embedding capacity without any noticeable distortion to the cover image, image quality and robustness against image manipulation attacks. Chaotic maps have many compelling features such as high sensitivity to the primary conditions, the outspreading of orbits over the entire space, sensitivity to control parameters, ergodicity, and random behavior These excellent properties make chaotic maps very good candidates for data hiding applications. To introduce the chaotic activity, the value of this factor should be between 3.57 and 4 [10]

Tent Map
Henon Map
THE PROPOSED ALGORITHEM
Embedding Process
EXPERIMENTAL RESULTS
ROBUSTNESS OF THE PROPOSED ALGORITHM
COMPARISION WITH OTHER APPROACHES
With Attack
VIII. CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call