Chaotic system-based secure data hiding scheme with high embedding capacity

被引:8
|
作者
Yadav, Gyan Singh [1 ]
Ojha, Aparajita [1 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg Ja, Comp Sci & Engn, Jabalpur 482005, Madhya Pradesh, India
关键词
Steganographic method; Chaotic map; Data security; Imperceptibility; STEGANOGRAPHY; ALGORITHM; IMAGES;
D O I
10.1016/j.compeleceng.2018.02.022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, data hiding has emerged as one of the main research areas in digital security. There are plenty of schemes to hide the secret data into the least significant bit planes of an image. Most of them either traverse the image pixels according to the scanning methods or using some structural fixed patterns. Researchers have proposed data hiding techniques with an orientation of hiding the content of the information, but algorithms are known publicly. Hence, the secret data is prone to be revealed easily. To provide higher security, several methods have been proposed that determine data hiding locations using certain patterns/formula. Chaotic systems have also been effectively utilized to devise secret key based data hiding algorithms. This alleviates the problem of easy retrieval even if the embedding algorithm is known. The present paper proposes a chaotic system based data hiding scheme that provides high payload as well as imperceptibility. In addition, the scheme exhibits excellent performance in terms of data security. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:447 / 460
页数:14
相关论文
共 50 条
  • [1] 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos
    Kacar, Sezgin
    Konyar, Mehmet Zeki
    Cavusoglu, Unal
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [2] Secure high capacity tetris-based scheme for data hiding
    Su, Guo-Dong
    Chang, Chin-Chen
    Lin, Chia-Chen
    Yao, Zhi-Qiang
    IET IMAGE PROCESSING, 2020, 14 (17) : 4633 - 4645
  • [3] Secure high capacity data hiding scheme based on reference matrix
    Li, Xiao-Shuang
    Chang, Chin-Chen
    He, Ming-Xing
    Lin, Chia-Chen
    International Journal of Network Security, 2019, 21 (06) : 918 - 929
  • [4] A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors
    Chang, Chin-Chen
    Chang, Jen-Chun
    Chou, Yun-Hong
    Wu, Hsin-Lung
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 578 - 587
  • [5] A secure and high capacity data hiding scheme for binary images
    Liang, Hua-Qing
    Ran, Wen-Bo
    Niu, Xin-Xin
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 224 - +
  • [6] A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity
    Yadav, Gyan Singh
    Ojha, Aparajita
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1555 - 1559
  • [7] A high capacity data hiding scheme based on DFT
    Song, YX
    Cui, MH
    Yao, HX
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 82 - 88
  • [8] Lossless data hiding for high embedding capacity
    Lee, Hyeran
    Rhee, Kyunghyune
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2006, 4317 : 424 - +
  • [9] A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    Shyi, Chia-Nian
    Kuo, Shao-Hung
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 69 - +
  • [10] Recovery based high capacity reversible data hiding scheme using even-odd embedding
    Aruna Malik
    Samayveer Singh
    Rajeev Kumar
    Multimedia Tools and Applications, 2018, 77 : 15803 - 15827