Abstract
Steganography is one of the well-known data hiding methods, which is used in many security companies and government communications. In this technique, the various types of digital media can be used as a cover to hide secret information without impress the general form of them. Generally, key space and security are two important matters in most steganography methods, and they have the direct impact in proposed method’s security. Moreover, Chaotic maps have been used in many data hiding algorithms to increase the security and key space of proposed schemes. The main reasons of using chaotic maps in steganography methods are sensitivity to initial conditions and control parameters. This paper proposes a new steganography technique based on new 3d sine chaotic map. This map is used in embedding and extracting processes to increase the security of the proposed algorithm. Satisfactory performance, acceptable image distortion and stronger robustness against some attacks are the main features of proposed method, and they are shown in experimental results. Comparison with some existing method shows that the quality and performance of the proposed algorithm are good, and it has high security and acceptable robustness against cropping and salt & pepper attacks.
Similar content being viewed by others
References
Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99
Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimed Tools Appl 30(1):55–88
Barani MJ, Ayubi P, Jalili F, Valandar MY, Azariyun E (2015) Image forgery detection in contourlet transform domain based on new chaotic cellular automata. Secur Commun Netw 8(18):4343–4361
Belazi A, El-Latif AAA, Diaconu A-V, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50
Chai X (2017) An image encryption algorithm based on bit level brownian motion and new chaotic systems. Multimed Tools Appl 76(1):1159–1175
Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. In: Intelligent techniques in signal processing for multimedia security. Springer, pp 133–149
Chen X, Gao G, Liu D, Xia Z (2016) Steganalysis of lsb matching using characteristic function moment of pixel differences. China Commun 13(7):66–73
Chen L, Zhao J (2017) Robust contourlet-based blind watermarking for depth-image-based rendering 3d images. Signal Process Image Commun 54:56–65
Cheng W-C, Pedram M (2004) Chromatic encoding: a low power encoding technique for digital visual interface. IEEE Trans Consum Electron 50(1):320–328
El Hennawy HM, Omar AE, Kholaif SM (2015) Lea: link encryption algorithm proposed stream cipher algorithm. Ain Shams Eng J 6(1):57–65
Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907
Ghebleh M, Kanso A, Stevanović D (2017) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimedia Tools and Applications 77(6):7305–7326
Gutub AA-A, et al. (2010) Pixel indicator technique for rgb image steganography. J Emerg Technol Web Intell 2(1):56–64
Hilborn RC (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers, Oxford University Press on Demand, Oxford
Hu T, Liu Y, Gong L-H, Guo S-F, Yuan H-M (2017) Chaotic image cryptosystem using dna deletion and dna insertion. Signal Process 134:234–243
Hu T, Liu Y, Gong L-H, Ouyang C-J (2017) An image encryption scheme combining chaos with cycle operation for dna sequences. Nonlinear Dyn 87(1):51–66
Hussain M, Wahab AWA, Ho AT, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57
Jassim FA A novel steganography algorithm for hiding text in image using five modulus method, arXiv:1307.0642
Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123– 6130
Kumar M, Kumar S, Budhiraja R, Das M, Singh S (2017) A cryptographic model based on logistic map and a 3-d matrix. J Inf Secur Appl 32:47–58
Lalitha R, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: Computer communication, networking and internet security. Springer, pp 261–270
Lee C-F, Weng C-Y, Chen K-C (2017) An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimed Tools Appl 76(7):9993–10016
Leihong Z, Zilan P, Luying W, Xiuhua M (2016) High-performance compression and double cryptography based on compressive ghost imaging with the fast fourier transform. Opt Lasers Eng 86:329–337
Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133
Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115
Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimed Tools Appl 76(11):13025–13046
Martínez-González RF, Díaz-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina R (2016) A steganographic method using bernoulli’s chaotic maps. Comput Electr Eng 54:435– 449
Moosazadeh M, Ekbatanifard G (2017) An improved robust image watermarking method using dct and ycocg-r color space. Optik-Int J Light Electron Opt 140:975–988
Muhammad K, Ahmad J, Sajjad M, Zubair M Secure image steganography using cryptography and image transposition, arXiv:1510.04413
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867–14893
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626
Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40 (1):70–82
Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Hiding in encrypted images: a three tier security data hiding technique. Multidim Syst Sign Process 28 (2):549–572
Parah SA, Sheikh JA, Loan NA, Bhat G (2017) A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In: Multimedia forensics and security. Springer, pp 223–252
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293
Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389
Schaefer G, Stich M (2004) Ucid: an uncompressed color image database. Storage Retr Methods Appl Multimed 5307:472–480
Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on qr decomposition. Multimed Tools Appl 72 (1):987–1009
Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106
Su Q, Wang G, Zhang X, Lv G, Chen B (2017) An improved color image watermarking algorithm based on qr decomposition. Multimed Tools Appl 76 (1):707–729
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113
Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and qr factorization. Comput Electr Eng 54:406–422
Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digit Signal Process 38:77–94
Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151
Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of fridrich’s chaotic image encryption scheme. Signal Process 132:150–154
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
All authors declare that they have no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Valandar, M.Y., Barani, M.J., Ayubi, P. et al. An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl 78, 9971–9989 (2019). https://doi.org/10.1007/s11042-018-6584-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6584-2