iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11042-018-6584-2
An integer wavelet transform image steganography method based on 3D sine chaotic map | Multimedia Tools and Applications Skip to main content
Log in

An integer wavelet transform image steganography method based on 3D sine chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is one of the well-known data hiding methods, which is used in many security companies and government communications. In this technique, the various types of digital media can be used as a cover to hide secret information without impress the general form of them. Generally, key space and security are two important matters in most steganography methods, and they have the direct impact in proposed method’s security. Moreover, Chaotic maps have been used in many data hiding algorithms to increase the security and key space of proposed schemes. The main reasons of using chaotic maps in steganography methods are sensitivity to initial conditions and control parameters. This paper proposes a new steganography technique based on new 3d sine chaotic map. This map is used in embedding and extracting processes to increase the security of the proposed algorithm. Satisfactory performance, acceptable image distortion and stronger robustness against some attacks are the main features of proposed method, and they are shown in experimental results. Comparison with some existing method shows that the quality and performance of the proposed algorithm are good, and it has high security and acceptable robustness against cropping and salt & pepper attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99

    Article  Google Scholar 

  2. Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimed Tools Appl 30(1):55–88

    Article  Google Scholar 

  3. Barani MJ, Ayubi P, Jalili F, Valandar MY, Azariyun E (2015) Image forgery detection in contourlet transform domain based on new chaotic cellular automata. Secur Commun Netw 8(18):4343–4361

    Article  Google Scholar 

  4. Belazi A, El-Latif AAA, Diaconu A-V, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  5. Chai X (2017) An image encryption algorithm based on bit level brownian motion and new chaotic systems. Multimed Tools Appl 76(1):1159–1175

    Article  Google Scholar 

  6. Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. In: Intelligent techniques in signal processing for multimedia security. Springer, pp 133–149

  7. Chen X, Gao G, Liu D, Xia Z (2016) Steganalysis of lsb matching using characteristic function moment of pixel differences. China Commun 13(7):66–73

    Article  Google Scholar 

  8. Chen L, Zhao J (2017) Robust contourlet-based blind watermarking for depth-image-based rendering 3d images. Signal Process Image Commun 54:56–65

    Article  Google Scholar 

  9. Cheng W-C, Pedram M (2004) Chromatic encoding: a low power encoding technique for digital visual interface. IEEE Trans Consum Electron 50(1):320–328

    Article  Google Scholar 

  10. El Hennawy HM, Omar AE, Kholaif SM (2015) Lea: link encryption algorithm proposed stream cipher algorithm. Ain Shams Eng J 6(1):57–65

    Article  Google Scholar 

  11. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907

    Article  Google Scholar 

  12. Ghebleh M, Kanso A, Stevanović D (2017) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimedia Tools and Applications 77(6):7305–7326

    Article  Google Scholar 

  13. Gutub AA-A, et al. (2010) Pixel indicator technique for rgb image steganography. J Emerg Technol Web Intell 2(1):56–64

    Google Scholar 

  14. Hilborn RC (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers, Oxford University Press on Demand, Oxford

  15. Hu T, Liu Y, Gong L-H, Guo S-F, Yuan H-M (2017) Chaotic image cryptosystem using dna deletion and dna insertion. Signal Process 134:234–243

    Article  Google Scholar 

  16. Hu T, Liu Y, Gong L-H, Ouyang C-J (2017) An image encryption scheme combining chaos with cycle operation for dna sequences. Nonlinear Dyn 87(1):51–66

    Article  Google Scholar 

  17. Hussain M, Wahab AWA, Ho AT, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57

    Article  Google Scholar 

  18. Jassim FA A novel steganography algorithm for hiding text in image using five modulus method, arXiv:1307.0642

  19. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123– 6130

    Article  Google Scholar 

  20. Kumar M, Kumar S, Budhiraja R, Das M, Singh S (2017) A cryptographic model based on logistic map and a 3-d matrix. J Inf Secur Appl 32:47–58

    Google Scholar 

  21. Lalitha R, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: Computer communication, networking and internet security. Springer, pp 261–270

  22. Lee C-F, Weng C-Y, Chen K-C (2017) An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimed Tools Appl 76(7):9993–10016

    Article  Google Scholar 

  23. Leihong Z, Zilan P, Luying W, Xiuhua M (2016) High-performance compression and double cryptography based on compressive ghost imaging with the fast fourier transform. Opt Lasers Eng 86:329–337

    Article  Google Scholar 

  24. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133

    Article  Google Scholar 

  25. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

    Article  Google Scholar 

  26. Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimed Tools Appl 76(11):13025–13046

    Article  Google Scholar 

  27. Martínez-González RF, Díaz-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina R (2016) A steganographic method using bernoulli’s chaotic maps. Comput Electr Eng 54:435– 449

    Article  Google Scholar 

  28. Moosazadeh M, Ekbatanifard G (2017) An improved robust image watermarking method using dct and ycocg-r color space. Optik-Int J Light Electron Opt 140:975–988

    Article  Google Scholar 

  29. Muhammad K, Ahmad J, Sajjad M, Zubair M Secure image steganography using cryptography and image transposition, arXiv:1510.04413

  30. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867–14893

    Article  Google Scholar 

  31. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626

    Article  Google Scholar 

  32. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40 (1):70–82

    Article  Google Scholar 

  33. Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Hiding in encrypted images: a three tier security data hiding technique. Multidim Syst Sign Process 28 (2):549–572

    Article  Google Scholar 

  34. Parah SA, Sheikh JA, Loan NA, Bhat G (2017) A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In: Multimedia forensics and security. Springer, pp 223–252

  35. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  36. Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389

    Article  Google Scholar 

  37. Schaefer G, Stich M (2004) Ucid: an uncompressed color image database. Storage Retr Methods Appl Multimed 5307:472–480

    Google Scholar 

  38. Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on qr decomposition. Multimed Tools Appl 72 (1):987–1009

    Article  Google Scholar 

  39. Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106

    Article  MathSciNet  Google Scholar 

  40. Su Q, Wang G, Zhang X, Lv G, Chen B (2017) An improved color image watermarking algorithm based on qr decomposition. Multimed Tools Appl 76 (1):707–729

    Article  Google Scholar 

  41. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113

    Article  Google Scholar 

  42. Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and qr factorization. Comput Electr Eng 54:406–422

    Article  Google Scholar 

  43. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digit Signal Process 38:77–94

    Article  Google Scholar 

  44. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151

    Google Scholar 

  45. Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of fridrich’s chaotic image encryption scheme. Signal Process 132:150–154

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Milad Yousefi Valandar.

Ethics declarations

Conflict of interests

All authors declare that they have no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Valandar, M.Y., Barani, M.J., Ayubi, P. et al. An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl 78, 9971–9989 (2019). https://doi.org/10.1007/s11042-018-6584-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6584-2

Keywords

Navigation