A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
A coverless image steganography based on robust image wavelet hashingTELKOMNIKA JOURNAL
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is collected to find appropriate images to be stego images. Thirdly, to build a hash sequence for an image, a powerful hashing algorithm is used. Fourthly, for each image hash sequence, the inverted index structure is created. Fifthly, choose the image which its hash equivalent to the secret data segment. Several tests are done to measure the robustness of the proposed method. The results of the experiments reveal that the proposed strategy is resistant to a variety of image processing attacks such as joint photographic experts group (JPEG) compression, noise, low pass filtering, scaling, rotation and median and mean filter, brightness, and sharpening.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible solution to this challenge as it has already been used for copyright protection, source tracking and video authentication. It also provides integrity protection, which is useful for many types of documents (official documents, medical images). In this paper, we propose a new watermarking solution applicable to images and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Over the last twenty years, chaos-based encryption has been an increasingly popular way to encrypt and decrypt data using nonlinear dynamics and deterministic chaos. Discrete chaotic systems based on iterative maps have gotten a lot of interest because of their simplicity and speed. In this paper, three kinds of chaotic maps are utilized to build a digital image encryption strategy depending on a chaotic system. These chaotic maps are the logistic map, Arnold Cat’s map, and Baker’s map. In addition to using the triple data encryption standard (3DES) encryption scheme with the chaotic maps mentioned. The results of the experiments revealed that the suggested digital image encryption technique is both efficient and secure, making it ideal for usage in insecure networks. The transmission control protocol (TCP)/internet protocol (IP) protocol was used for the purpose of transferring data from server to client through the network and vice versa.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
A coverless image steganography based on robust image wavelet hashingTELKOMNIKA JOURNAL
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is collected to find appropriate images to be stego images. Thirdly, to build a hash sequence for an image, a powerful hashing algorithm is used. Fourthly, for each image hash sequence, the inverted index structure is created. Fifthly, choose the image which its hash equivalent to the secret data segment. Several tests are done to measure the robustness of the proposed method. The results of the experiments reveal that the proposed strategy is resistant to a variety of image processing attacks such as joint photographic experts group (JPEG) compression, noise, low pass filtering, scaling, rotation and median and mean filter, brightness, and sharpening.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible solution to this challenge as it has already been used for copyright protection, source tracking and video authentication. It also provides integrity protection, which is useful for many types of documents (official documents, medical images). In this paper, we propose a new watermarking solution applicable to images and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Over the last twenty years, chaos-based encryption has been an increasingly popular way to encrypt and decrypt data using nonlinear dynamics and deterministic chaos. Discrete chaotic systems based on iterative maps have gotten a lot of interest because of their simplicity and speed. In this paper, three kinds of chaotic maps are utilized to build a digital image encryption strategy depending on a chaotic system. These chaotic maps are the logistic map, Arnold Cat’s map, and Baker’s map. In addition to using the triple data encryption standard (3DES) encryption scheme with the chaotic maps mentioned. The results of the experiments revealed that the suggested digital image encryption technique is both efficient and secure, making it ideal for usage in insecure networks. The transmission control protocol (TCP)/internet protocol (IP) protocol was used for the purpose of transferring data from server to client through the network and vice versa.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
Similar to Valandar2019_Article_AnIntegerWaveletTransformImage.pdf (20)
Tom Selleck Net Worth: A Comprehensive Analysisgreendigital
Over several decades, Tom Selleck, a name synonymous with charisma. From his iconic role as Thomas Magnum in the television series "Magnum, P.I." to his enduring presence in "Blue Bloods," Selleck has captivated audiences with his versatility and charm. As a result, "Tom Selleck net worth" has become a topic of great interest among fans. and financial enthusiasts alike. This article delves deep into Tom Selleck's wealth, exploring his career, assets, endorsements. and business ventures that contribute to his impressive economic standing.
Follow us on: Pinterest
Early Life and Career Beginnings
The Foundation of Tom Selleck's Wealth
Born on January 29, 1945, in Detroit, Michigan, Tom Selleck grew up in Sherman Oaks, California. His journey towards building a large net worth began with humble origins. , Selleck pursued a business administration degree at the University of Southern California (USC) on a basketball scholarship. But, his interest shifted towards acting. leading him to study at the Hills Playhouse under Milton Katselas.
Minor roles in television and films marked Selleck's early career. He appeared in commercials and took on small parts in T.V. series such as "The Dating Game" and "Lancer." These initial steps, although modest. laid the groundwork for his future success and the growth of Tom Selleck net worth. Breakthrough with "Magnum, P.I."
The Role that Defined Tom Selleck's Career
Tom Selleck's breakthrough came with the role of Thomas Magnum in the CBS television series "Magnum, P.I." (1980-1988). This role made him a household name and boosted his net worth. The series' popularity resulted in Selleck earning large salaries. leading to financial stability and increased recognition in Hollywood.
"Magnum P.I." garnered high ratings and critical acclaim during its run. Selleck's portrayal of the charming and resourceful private investigator resonated with audiences. making him one of the most beloved television actors of the 1980s. The success of "Magnum P.I." played a pivotal role in shaping Tom Selleck net worth, establishing him as a major star.
Film Career and Diversification
Expanding Tom Selleck's Financial Portfolio
While "Magnum, P.I." was a cornerstone of Selleck's career, he did not limit himself to television. He ventured into films, further enhancing Tom Selleck net worth. His filmography includes notable movies such as "Three Men and a Baby" (1987). which became the highest-grossing film of the year, and its sequel, "Three Men and a Little Lady" (1990). These box office successes contributed to his wealth.
Selleck's versatility allowed him to transition between genres. from comedies like "Mr. Baseball" (1992) to westerns such as "Quigley Down Under" (1990). This diversification showcased his acting range. and provided many income streams, reinforcing Tom Selleck net worth.
Television Resurgence with "Blue Bloods"
Sustaining Wealth through Consistent Success
In 2010, Tom Selleck began starring as Frank Reagan i
As a film director, I have always been awestruck by the magic of animation. Animation, a medium once considered solely for the amusement of children, has undergone a significant transformation over the years. Its evolution from a rudimentary form of entertainment to a sophisticated form of storytelling has stirred my creativity and expanded my vision, offering limitless possibilities in the realm of cinematic storytelling.
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdfXtreame HDTV
In today’s digital age, streaming services have become an integral part of our entertainment lives. Among the myriad of options available, XCIPTV stands out as a premier choice for those seeking seamless, high-quality streaming. This comprehensive guide will delve into the features, benefits, and user experience of XCIPTV, illustrating why it is a top contender in the IPTV industry.
Panchayat Season 3 - Official Trailer.pdfSuleman Rana
The dearest series "Panchayat" is set to make a victorious return with its third season, and the fervor is discernible. The authority trailer, delivered on May 28, guarantees one more enamoring venture through the country heartland of India.
Jitendra Kumar keeps on sparkling as Abhishek Tripathi, the city-reared engineer who ends up functioning as the secretary of the Panchayat office in the curious town of Phulera. His nuanced depiction of a young fellow exploring the difficulties of country life while endeavoring to adjust to his new environmental factors has earned far and wide recognition.
Neena Gupta and Raghubir Yadav return as Manju Devi and Brij Bhushan Dubey, separately. Their dynamic science and immaculate acting rejuvenate the hardships of town administration. Gupta's depiction of the town Pradhan with an ever-evolving outlook, matched with Yadav's carefully prepared exhibition, adds profundity and credibility to the story.
New Difficulties and Experiences
The trailer indicates new difficulties anticipating the characters, as Abhishek keeps on wrestling with his part in the town and his yearnings for a superior future. The series has reliably offset humor with social editorial, and Season 3 looks ready to dig much more profound into the intricacies of rustic organization and self-awareness.
Watchers can hope to see a greater amount of the enchanting and particular residents who have become fan top picks. Their connections and the one of a kind cut of-life situations give a reviving and interesting portrayal of provincial India, featuring the two its appeal and its difficulties.
A Mix of Humor and Heart
One of the signs of "Panchayat" is its capacity to mix humor with sincere narrating. The trailer features minutes that guarantee to convey giggles, as well as scenes that pull at the heartstrings. This equilibrium has been a critical calculate the show's prosperity, resounding with crowds across different socioeconomics.
Creation Greatness
The creation quality remaining parts first rate, with the beautiful setting of Phulera town filling in as a scenery that upgrades the narrating. The meticulousness in portraying provincial life, joined with sharp composition and solid exhibitions, guarantees that "Panchayat" keeps on hanging out in the packed web series scene.
Expectation and Delivery
As the delivery date draws near, expectation for "Panchayat" Season 3 is at a record-breaking high. The authority trailer has previously created critical buzz, with fans enthusiastically anticipating the continuation of Abhishek Tripathi's excursion and the new undertakings that lie ahead in Phulera.
All in all, the authority trailer for "Panchayat" Season 3 recommends that watchers are in for another drawing in and engaging ride. Yet again with its charming characters, convincing story, and ideal mix of humor and show, the new season is set to enamor crowds. Write in your schedules and prepare to get back to the endearing universe of "Panchayat."
Scandal! Teasers June 2024 on etv Forum.co.zaIsaac More
Monday, 3 June 2024
Episode 47
A friend is compelled to expose a manipulative scheme to prevent another from making a grave mistake. In a frantic bid to save Jojo, Phakamile agrees to a meeting that unbeknownst to her, will seal her fate.
Tuesday, 4 June 2024
Episode 48
A mother, with her son's best interests at heart, finds him unready to heed her advice. Motshabi finds herself in an unmanageable situation, sinking fast like in quicksand.
Wednesday, 5 June 2024
Episode 49
A woman fabricates a diabolical lie to cover up an indiscretion. Overwhelmed by guilt, she makes a spontaneous confession that could be devastating to another heart.
Thursday, 6 June 2024
Episode 50
Linda unwittingly discloses damning information. Nhlamulo and Vuvu try to guide their friend towards the right decision.
Friday, 7 June 2024
Episode 51
Jojo's life continues to spiral out of control. Dintle weaves a web of lies to conceal that she is not as successful as everyone believes.
Monday, 10 June 2024
Episode 52
A heated confrontation between lovers leads to a devastating admission of guilt. Dintle's desperation takes a new turn, leaving her with dwindling options.
Tuesday, 11 June 2024
Episode 53
Unable to resort to violence, Taps issues a verbal threat, leaving Mdala unsettled. A sister must explain her life choices to regain her brother's trust.
Wednesday, 12 June 2024
Episode 54
Winnie makes a very troubling discovery. Taps follows through on his threat, leaving a woman reeling. Layla, oblivious to the truth, offers an incentive.
Thursday, 13 June 2024
Episode 55
A nosy relative arrives just in time to thwart a man's fatal decision. Dintle manipulates Khanyi to tug at Mo's heartstrings and get what she wants.
Friday, 14 June 2024
Episode 56
Tlhogi is shocked by Mdala's reaction following the revelation of their indiscretion. Jojo is in disbelief when the punishment for his crime is revealed.
Monday, 17 June 2024
Episode 57
A woman reprimands another to stay in her lane, leading to a damning revelation. A man decides to leave his broken life behind.
Tuesday, 18 June 2024
Episode 58
Nhlamulo learns that due to his actions, his worst fears have come true. Caiphus' extravagant promises to suppliers get him into trouble with Ndu.
Wednesday, 19 June 2024
Episode 59
A woman manages to kill two birds with one stone. Business doom looms over Chillax. A sobering incident makes a woman realize how far she's fallen.
Thursday, 20 June 2024
Episode 60
Taps' offer to help Nhlamulo comes with hidden motives. Caiphus' new ideas for Chillax have MaHilda excited. A blast from the past recognizes Dintle, not for her newfound fame.
Friday, 21 June 2024
Episode 61
Taps is hungry for revenge and finds a rope to hang Mdala with. Chillax's new job opportunity elicits mixed reactions from the public. Roommates' initial meeting starts off on the wrong foot.
Monday, 24 June 2024
Episode 62
Taps seizes new information and recruits someone on the inside. Mary's new job
Hollywood Actress - The 250 hottest galleryZsolt Nemeth
Hollywood Actress amazon album eminent worldwide media, female-singer, actresses, alhletina-woman, 250 collection.
Highest and photoreal-print exclusive testament PC collage.
Focused television virtuality crime, novel.
The sheer afterlife of the work is activism-like hollywood-actresses point com.
173 Illustrate, 250 gallery, 154 blog, 120 TV serie logo, 17 TV president logo, 183 active hyperlink.
HD AI face enhancement 384 page plus Bowker ISBN, Congress LLCL or US Copyright.
Skeem Saam in June 2024 available on ForumIsaac More
Monday, June 3, 2024 - Episode 241: Sergeant Rathebe nabs a top scammer in Turfloop. Meikie is furious at her uncle's reaction to the truth about Ntswaki.
Tuesday, June 4, 2024 - Episode 242: Babeile uncovers the truth behind Rathebe’s latest actions. Leeto's announcement shocks his employees, and Ntswaki’s ordeal haunts her family.
Wednesday, June 5, 2024 - Episode 243: Rathebe blocks Babeile from investigating further. Melita warns Eunice to stay clear of Mr. Kgomo.
Thursday, June 6, 2024 - Episode 244: Tbose surrenders to the police while an intruder meddles in his affairs. Rathebe's secret mission faces a setback.
Friday, June 7, 2024 - Episode 245: Rathebe’s antics reach Kganyago. Tbose dodges a bullet, but a nightmare looms. Mr. Kgomo accuses Melita of witchcraft.
Monday, June 10, 2024 - Episode 246: Ntswaki struggles on her first day back at school. Babeile is stunned by Rathebe’s romance with Bullet Mabuza.
Tuesday, June 11, 2024 - Episode 247: An unexpected turn halts Rathebe’s investigation. The press discovers Mr. Kgomo’s affair with a young employee.
Wednesday, June 12, 2024 - Episode 248: Rathebe chases a criminal, resorting to gunfire. Turf High is rife with tension and transfer threats.
Thursday, June 13, 2024 - Episode 249: Rathebe traps Kganyago. John warns Toby to stop harassing Ntswaki.
Friday, June 14, 2024 - Episode 250: Babeile is cleared to investigate Rathebe. Melita gains Mr. Kgomo’s trust, and Jacobeth devises a financial solution.
Monday, June 17, 2024 - Episode 251: Rathebe feels the pressure as Babeile closes in. Mr. Kgomo and Eunice clash. Jacobeth risks her safety in pursuit of Kganyago.
Tuesday, June 18, 2024 - Episode 252: Bullet Mabuza retaliates against Jacobeth. Pitsi inadvertently reveals his parents’ plans. Nkosi is shocked by Khwezi’s decision on LJ’s future.
Wednesday, June 19, 2024 - Episode 253: Jacobeth is ensnared in deceit. Evelyn is stressed over Toby’s case, and Letetswe reveals shocking academic results.
Thursday, June 20, 2024 - Episode 254: Elizabeth learns Jacobeth is in Mpumalanga. Kganyago's past is exposed, and Lehasa discovers his son is in KZN.
Friday, June 21, 2024 - Episode 255: Elizabeth confirms Jacobeth’s dubious activities in Mpumalanga. Rathebe lies about her relationship with Bullet, and Jacobeth faces theft accusations.
Monday, June 24, 2024 - Episode 256: Rathebe spies on Kganyago. Lehasa plans to retrieve his son from KZN, fearing what awaits.
Tuesday, June 25, 2024 - Episode 257: MaNtuli fears for Kwaito’s safety in Mpumalanga. Mr. Kgomo and Melita reconcile.
Wednesday, June 26, 2024 - Episode 258: Kganyago makes a bold escape. Elizabeth receives a shocking message from Kwaito. Mrs. Khoza defends her husband against scam accusations.
Thursday, June 27, 2024 - Episode 259: Babeile's skillful arrest changes the game. Tbose and Kwaito face a hostage crisis.
Friday, June 28, 2024 - Episode 260: Two women face the reality of being scammed. Turf is rocked by breaking
Meet Crazyjamjam - A TikTok Sensation | Blog EternalBlog Eternal
Crazyjamjam, the TikTok star everyone's talking about! Uncover her secrets to success, viral trends, and more in this exclusive feature on Blog Eternal.
Source: https://blogeternal.com/celebrity/crazyjamjam-leaks/
From the Editor's Desk: 115th Father's day Celebration - When we see Father's day in Hindu context, Nanda Baba is the most vivid figure which comes to the mind. Nanda Baba who was the foster father of Lord Krishna is known to provide love, care and affection to Lord Krishna and Balarama along with his wife Yashoda; Letter’s to the Editor: Mother's Day - Mother is a precious life for their children. Mother is life breath for her children. Mother's lap is the world happiness whose debt can never be paid.
Are the X-Men Marvel or DC An In-Depth Exploration.pdfXtreame HDTV
The world of comic books is vast and filled with iconic characters, gripping storylines, and legendary rivalries. Among the most famous groups of superheroes are the X-Men. Created in the early 1960s, the X-Men have become a cultural phenomenon, featuring in comics, animated series, and blockbuster movies. A common question among newcomers to the comic book world is: Are the X-Men Marvel or DC? This article delves into the history, creators, and significant moments of the X-Men to provide a comprehensive answer.
In the vast landscape of cinema, stories have been told, retold, and reimagined in countless ways. At the heart of this narrative evolution lies the concept of a "remake". A successful remake allows us to revisit cherished tales through a fresh lens, often reflecting a different era's perspective or harnessing the power of advanced technology. Yet, the question remains, what makes a remake successful? Today, we will delve deeper into this subject, identifying the key ingredients that contribute to the success of a remake.
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...Rodney Thomas Jr
#SSAPhilosophy #DjangoUnchained #DjangoFreeman #ExistentialPhilosophy #Freedom #Identity #Justice #Courage #Rebellion #Transformation
Welcome to SSA Philosophy, your ultimate destination for diving deep into the profound philosophies of iconic characters from video games, movies, and TV shows. In this episode, we explore the powerful journey and existential philosophy of Django Freeman from Quentin Tarantino’s masterful film, "Django Unchained," in our video titled, "From Slave to Scourge: The Existential Choice of Django Unchained. The Philosophy of Django Freeman!"
From Slave to Scourge: The Existential Choice of Django Unchained – The Philosophy of Django Freeman!
Join me as we delve into the existential philosophy of Django Freeman, uncovering the profound lessons and timeless wisdom his character offers. Through his story, we find inspiration in the power of choice, the quest for justice, and the courage to defy oppression. Django Freeman’s philosophy is a testament to the human spirit’s unyielding drive for freedom and justice.
Don’t forget to like, comment, and subscribe to SSA Philosophy for more in-depth explorations of the philosophies behind your favorite characters. Hit the notification bell to stay updated on our latest videos. Let’s discover the principles that shape these icons and the profound lessons they offer.
Django Freeman’s story is one of the most compelling narratives of transformation and empowerment in cinema. A former slave turned relentless bounty hunter, Django’s journey is not just a physical liberation but an existential quest for identity, justice, and retribution. This video delves into the core philosophical elements that define Django’s character and the profound choices he makes throughout his journey.
Link to video: https://youtu.be/GszqrXk38qk
2. 9972 Multimedia Tools and Applications (2019) 78:9971–9989
1 Introduction
The most important issue in human’s life is extending the variety of digital data. This prob-
lem is significantly increased day by day. Generally, large amounts of data are used in
government or private agencies, medical centers and military’s communications. On the
other hand, each person has specific data, which include very important information about
his/her private stuffs. However, it is a remarkable point to provide the security of these data
as much as possible.
Usually, images, videos and audios are the most popular digital data, and more people
use them. They are shared in many social networks and no one’s paying attention to their
security [41]. Nevertheless, difference methods have been proposed to enhance the secu-
rity of digital data. The categories of proposed methods are based on their applications and
robustness against attacks. On the other hand, digital data are considered as a cover to hide
important information or secret messages. For example, important messages hide inside the
other data in military or security systems. This process did not change the quality of covers,
and it is hard to detect actual messages by the others. Different types of methods have been
proposed to hide important information which cryptography, watermarking and steganogra-
phy are the most well-known methods. In cryptography techniques, data is usually shuffled
with special keys, and only the sender and receiver are able to reconstruct the data with
same keys [1, 45]. In these methods, data protects themselves from attacks. Many image
encryption methods have been proposed [5, 12, 16, 24, 25] for digital data which some of
them are discussed in the following. Zhang Leihong et al. proposed a high-performance
cryptography for large images in [23]. In this method, the sender encrypted image with
Fast Fourier Transform and then this image encrypted again by the system of compres-
sive ghost imaging (CGI). Likewise, the receiver decrypted image by FFT and compressive
sensing (CS). The results of simulation showed the performance, security and combina-
tion of CS, and FFT improved the security of proposed method against chosen-plain text
attack, cipher-text attack and noise attack. In [20], Manish Kumar et al. suggested a new
data encryption method based on position substitution, shuffling and a diffusion process.
This method generated a 3D matrix for finding the position of a text symbol and then this
position shuffled by encryption key. Matrix generation and position shuffling are done by
logistic chaotic map. The integrity of cipher text checked by its parity in the encrypted form.
Simulation results demonstrate remarkable robustness of the proposed scheme against sta-
tistical attacks. Ting Hu et al. proposed an image cryptography based on chaotic map and
a DNA sequence in [15]. Proposed approach employed the Logistic-Sine system (LSS) in
the coupled map lattice (CML) to generate sequences with better chaotic characteristics.
This algorithm diffused images with unique chaotic key, and the insertion of DNA is used
to confuse DNA encode. Experimental results demonstrated the acceptable speed of pro-
posed method and good robustness against some recognized attacks. Akram Belazi et al.
presented an image encryption scheme based on a chaotic map [4]. Proposed scheme used
substitution-boxes, linear fractional transform and lifting wavelet transform to encrypt the
sensitive parts of images. Proposed algorithm used dynamic keys instead of fixed key to
control the encryption process and make any attacks impossible. Extensive experiments
showed the high performance and great potential of proposed approach.
In watermarking methods, the watermarks are embedded inside digital media to protect
them against many illegal manipulations. Usually, watermarks are the composition informa-
tion of owners. Difference types of watermarking methods have been proposed in [3, 6, 34,
39, 40]. Chuan Qin et al. proposed a new fragile watermarking method based on overlap-
3. Multimedia Tools and Applications (2019) 78:9971–9989 9973
Fig. 1 Time series of 3d sine map for xi (left), yi (middle) and zi (right)
ping strategy in [35]. This method used the block-wise mechanism and the pixel-wise for
tampering localization and content recovery, respectively. This method embedded authen-
tication bits into pixel’s least significant bits (LSB), then used these bits to find forged
parts. The results of tests demonstrated the capability of proposed method in localizing
forged areas. M. Moosazadeha and G. Ekbatanifard presented a digital image watermarking
algorithm [28]. Proposed technique used YCoCg-R color space to increase the robustness
of the suggested algorithm against various attacks. Proposed method also utilized discrete
cosine transform and the coefficient of relationship in embedding process. In this method,
the blocks’ complexities in the host image are calculated to select embedding blocks, and
increased the resistance of the proposed scheme against JPEG compression. Comparison
with similar techniques showed good performance of proposed method in imperceptibility,
robustness and capacity of proposed approach. L. Chen and J. Zhao suggested a new blind
watermarking scheme for depth-image-based rendering (DIBR) 3D images in [8]. They
used contourlet transform in embedding and extracting processes. The simulation results
illustrated that the proposed method has acceptable robustness against noise addition, image
compression, geometric attacks and good performance in terms of depth image variation.
Zhuhong Shao et al. presented a robust watermarking technique based on chaotic map and
orthogonal Fourier-Mellin moments. This method contained ownership registration phase
and verification phase. In this method, a binary future of image is calculated with orthogonal
Fourier-Mellin moments, and chaotic map generated the verification of image. Experimen-
tal results illustrated acceptable validity and security of proposed method against difference
attacks.
Steganography is the art of hiding a secure message inside different types of digital
media. The actual challenge in this technique is hiding important data in a cover without
destroy any parts of cover. Generally, many special steganography methods have been pro-
posed for different messages and covers [21, 22, 26, 33, 44]. Images are the most popular
covers in the steganography techniques. Generally, spatial domain and transform domain
steganography are the most well-known techniques in image steganography methods. The
spatial domain schemes embed the bits of secure message in cover bits directly [7, 30, 31].
Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), and Discrete Wavelet
Transform (DWT) are the most well-known transforms, that used in transform domain meth-
ods. These transforms apply on cover and stego images to improve the visual quality of
methods in embedding and extracting processes. Generally, proposed approaches used dif-
ference way to enhance the robustness. For example, some schemes use transforms, chaos
maps or combined methods. M. Ghebleh and A. Kanso introduced a steganography method
based on 3D chaotic cat map and lifted discrete wavelet transforms [11]. This method used
Sweldens lifting scheme to ensure integer-to-integer transform. The experimental results
4. 9974 Multimedia Tools and Applications (2019) 78:9971–9989
0
0.2
0.4
0.6
0.8
1
0
0.2
0.4
0.6
0.8
1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
X
Y
Z
Fig. 2 The attractor of 3d sine map, for i = 1, . . . , 5000
demonstrated the efficiency and flexibility of proposed method. Mehdi Hussain et al. pre-
sented a new data hiding method for digital images in [17]. Proposed method used the
difference values between pixels in each block to determine the selection of parity-bit pixel
value difference (PBPVD) and improved rightmost digit replacement (iRMDR). Experi-
mental results determined good visual quality and high robustness against RS and histogram
analysis attacks. R. González et al. suggested a new method for images steganography
in [27]. This paper used Bernoulli chaotic maps and the least significant bit technique in
embedding and extracting processes. In this method, secure message bits are encrypted,
and they are embedded in random RGB channels. The experimental results showed good
improvement in the image fidelity, and peak signal to noise ratio (PSNR).
The remaining part of this paper is organized as follows: The chaotic map is described in
Section 2. Section 3 presents proposed steganography method. Performance evaluation and
experimental results of the proposed method are presented in Section 4. The comparison
results of proposed method with other algorithms are investigated in Section 5. Finally,
Section 6 concludes this paper.
2 Extraction of 3D sine map
Sensitivity to initial conditions and control parameters are the main features of chaotic maps.
These features have been used in many security systems and methods. Generally, to create
chaotic behaviors the simple linear or non-linear equations are used. For example, logistic
map is one of the well-known chaotic map. This map is very simple, fast and it has some
5. Multimedia Tools and Applications (2019) 78:9971–9989 9975
Fig. 3 Histogram analysis and bifurcation of 3d sine map, a Histogram analysis, b Bifurcation diagrams
unique properties. Sine map is another simple map that has chaotic behaviors and it is very
similar to logistic map [14]. The classical form of this map is defined by:
xn+1 = μsin(πxn) (1)
where μ 0 and it is control parameter, x0 is initial condition and it is in interval [0,1].
This map has a control keys and one dimension, so it isn’t good to use in color images. In
order to increase the key space of this map and its dimension, this paper introduced a new
three dimensional sine map. In the first steps, the φ1, φ2 and φ3 functions are defined by
following equation:
⎧
⎨
⎩
φ1(xn, yn) = sin(π x(1 − y))
φ2(yn, zn) = sin(π y(1 − z))
φ3(zn, xn) = sin(π z(1 − x))
(2)
Fig. 4 Cross correlation between sequences xi, yi (right) and auto correlation of sequence xi (left)
6. 9976 Multimedia Tools and Applications (2019) 78:9971–9989
Fig. 5 The diagram of embedding phases in proposed steganography method
In the next step, δ, η and κ control keys are added to increase the key space. New functions
are calculated by:
⎧
⎪
⎪
⎪
⎪
⎪
⎨
⎪
⎪
⎪
⎪
⎪
⎩
xn+1 = δ φ1(xn,yn)
φ2(yn,zn)
yn+1 = ηφ2(yn,zn)
φ3(zn,xn)
zn+1 = κ φ3(zn,xn)
φ1(xn,yn)
(3)
Modulo operation is used in the next step to generate results in interval [0,1]. Finally, the
main formula of new three dimensional sine map is defined by:
⎧
⎪
⎪
⎪
⎪
⎪
⎪
⎪
⎨
⎪
⎪
⎪
⎪
⎪
⎪
⎪
⎩
xn+1 ≡
δ3sin(πxn(1−yn))
sin(πyn(1−zn))
mod 1
yn+1 ≡
η3sin(πyn(1−zn))
sin(πzn(1−xn))
mod 1
zn+1 ≡
κ3sin(πzn(1−xn))
sin(πxn(1−yn))
mod 1
(4)
where x0, y0 and z0 are initial conditions and they are in interval [0,1]. δ, η and κ are control
parameters and they are in interval [1,4]. The simulation results of map show that the power
3 of control keys generate better pseudo random numbers. Figure 1 illustrates the time series
of xi, yi and zi (i = 1, . . . , 150) sequences. The visual representation of attractor for 3d
sine map is shown in Fig. 2. Histogram analysis and bifurcation diagram are shown in Fig. 3.
These figures show the chaotic behavior of 3d sine map.
7. Multimedia Tools and Applications (2019) 78:9971–9989 9977
Fig. 6 The diagram of extracting phases in proposed steganography method
Cross correlation and auto correlation are the other tests which used to evaluate the gener-
ated sequences by 3d sine map. Cross correlation is the correlations between two sequences,
and it shows the best interval for these sequences. The values of this test are between 1 and -1
in standard form. Auto correlation is the correlations between a sequence and itself. Figure 4
shows the results of cross correlation between sequences xi and yi, and auto correlation for
sequence xi (i = 1, . . . , 2000).
ENT, NIST and DIEHARD test suites are the most well-known statistical tests. These
tests have been developed to show the randomness properties of pseudo-random number
generators. This paper use these tests to investigate the randomness of 3d sine map. Three
sequences are generated for xi, yi and zi (i = 10000000), separately. These sequences are
saved as bin files and used in ENT, NIST and DIEHARD test suits. The results of these test
suites are shown in Tables 1, 2, and 3.
Table 1 ENT test suite of 3d sine map
Test name P-value
x y z
Entropy 7.999989 7.999997 7.999993
Arithmetic mean 127.6783 127.3936 127.4903
Monte carlo 3.1415926548 3.1415926352 3.1415926262
Chi-square 267.51 282.37 273.73
Serial correlation coefficient 0.000093 0.000173 0.000043
8. 9978 Multimedia Tools and Applications (2019) 78:9971–9989
Table 2 NIST test suite of 3d sine map
Test name P-value
x y z
Frequency 0.634773 0.854674 0.567785
Block-frequency 0.375777 0.546766 0.785674
Cumulative-sums (forward) 0.546754 0.587858 0.678564
Cumulative-sums (reverse) 0.458788 0.785678 0.686541
Runs 0.587578 0.857854 0.789842
Longest-runs 0.546734 0.784763 0.467478
Rank 0.619782 0.784849 0.678458
FFT 0.757854 0.536347 0.678578
Non-overlapping-templates 0.864736 0.635783 0.776763
Overlapping-templates 0.567327 0.578473 0.767836
Universal 0.562375 0.456734 0.634767
Approximate entropy 0.436467 0.484785 0.678464
Random-excursions 0.784578 0.567588 0.754673
Random-excursions variant 0.845784 0.585478 0.596535
Serial 1 0.567851 0.747347 0.673632
Serial 2 0.723519 0.622257 0.795421
3 Proposed steganography method
This section presents a new digital image steganography. The main processes of proposed
steganography are embedding and extracting processes. Embedding process contains seven
phases. In phase one, a cover image with size M × N × K and secure message with size
a × b enter in the algorithm. Phase two applies integer wavelet transform on RGB chan-
nels of cover image and puts the LL sub bands on matrix I. Blocking process is started in
phase three and algorithm divides matrix I into 16×16 non-overlapping blocks. The block-
wise permutation is performed in phase four and then algorithm puts the permuted blocks
in matrix P . Permutation process is used to increase the security of proposed approach.
In phase five, 3d sine map uses keys 1 (x0, y0, z0, δ, η and κ) to generate random deci-
mal numbers by (4) and algorithm changes these numbers to integer form by (5) and key
2 (ω, σ and θ). In phase six, the output numbers of (5) are used as a coordinate and color
channel in matrix P to embed the bits of secure message. These steps (phase five and phase
six) are repeated until the proposed algorithm embeds all bits of hidden message. Proposed
algorithm performs the inverse of block-wise permutation in phase seven and finally, algo-
rithm applies the inverse of integer wavelet transform to generate stego image. The steps of
embedding process are shown in Fig. 5. Proposed algorithm uses a mask matrix to prevent
selecting pixels that have already been embedded.
⎧
⎪
⎪
⎪
⎪
⎨
⎪
⎪
⎪
⎪
⎩
xn+1 ≡ 1 + mod ( ω × xn × 1014, M)
yn+1 ≡ 1 + mod ( σ × yn × 1014, N)
zn+1 ≡ 1 + mod ( θ × zn × 1014, K)
(5)
9. Multimedia Tools and Applications (2019) 78:9971–9989 9979
Table 3 DIEHARD test suite of 3d sine map
Test name P-value
x y z
Birthday spacing 0.546556 0.623562 0.435636
Overlapping permutation 0.572362 0.463465 0.567473
Binary rank 0.637347 0.435625 0.563457
Bitstream 0.456778 0.514673 0.447568
OPSO 0.356257 0.346235 0.347673
OQSO 0.365835 0.626525 0.567884
DNA 0.475481 0.546847 0.467848
Count the ones 0.367324 0.435734 0.574579
Parking lot 0.346756 0.367346 0.568547
Minimum distance 0.546736 0.475489 0.579256
3DS spheres 0.627934 0.580245 0.589207
Squeeze 0.235637 0.375591 0.402486
Overlapping sum 0.573468 0.495427 0.368025
Runs 0.467803 0.358246 0.483682
Extracting process includes six phase, which in phase one, stego image enters in extract-
ing algorithm. Phase two applies integer wavelet transform on RGB channels of stego image
and puts the LL sub bands on matrix I. In phase three, extracting algorithm divides matrix
I into 16 × 16 non-overlapping blocks. The block-wise permutation is performed in phase
four and algorithm puts the permuted blocks in matrix P . Proposed scheme permute the
blocks of stego image to find the exact location of embedded pixels. In phase five, 3d sine
map uses keys 1 to generate random decimal numbers by (4) and changes these numbers to
integer form by (5) and keys 2 (Keys 1 and Keys 2 are same in embedding and extracting
Table 4 PSNR and SSIM results of proposed steganography with the number of color channels
Cover Messages
77244 bits 9744 bits
PSNR SSIM Channels PSNR SSIM Channels
R G B R G B
Lena 1024 × 1024 53.76495 0.999642 25903 25637 25704 54.18924 0.999836 3285 3209 3250
Baboon 1024 × 1024 52.89769 0.999856 25685 25811 25748 53.22105 0.999949 3160 3257 3327
Peppers 1024 × 1024 54.78124 0.999691 25726 25874 25644 53.20573 0.999871 3260 3171 3313
Airplane 1024 × 1024 53.84573 0.999471 25635 25953 25656 52.90362 0.999603 3289 3136 3319
Lena 512 × 512 51.37613 0.998472 25872 25788 25584 51.18524 0.999617 3277 3205 3262
Baboon 512 × 512 52.42284 0.999189 25651 25805 25788 52.27376 0.999876 3329 3244 3171
Peppers 512 × 512 52.39078 0.998615 25692 25845 25707 52.21909 0.999694 3161 3350 3233
Airplane 512 × 512 51.98463 0.998058 25732 25406 26106 51.98378 0.999769 3240 3427 3077
10. 9980 Multimedia Tools and Applications (2019) 78:9971–9989
Fig. 7 The results of PSNR and SSIM measures for 100 cover images after embedding secure message
processes). In phase six, the output numbers of (5) are used as a coordinate and color chan-
nel in matrix P to extract the bits of secure message. Phase five and phase six are repeated
until all bits of the secure message extracted. The extracting process is finished by gener-
ating secure message. Figure 6 demonstrates the extracting process of proposed technique.
Mask matrix is used in extracting algorithm to avoid selecting pixels that have already been
extracted.
4 Experimental results
The important issues in proposing new methods are examining the results of tests and the
robustness of proposed methods against attacks. This paper uses some standard pictures like
Lena, Peppers and Baboon with different hiding messages to evaluate the proposed method
in embedding processes. The results of tests are calculated by using AMD Phenom II x4
processor, 8GB RAM, Linux Ubuntu 16 x64 OS and MATLAB R2016b x64 software.
4.1 PSNR and SSIM measures
Peak Signal to Noise Ratio (PSNR) and structural similarity index (SSIM) are two well-
known measures, which used to compare differences between original images and the
changed form of them. The results of PSNR show the visual quality of cover images after
embedding process. PSNR is calculated by following equation:
PSNR = 10 log10
MAX2
I
MSE
(6)
where MAXI is the value of possible pixel in the cover images. MSE is the mean square
error and it is defined by:
MSE =
1
mn
m
i=1
n
j=1
[C(i, j) − St(i, j)]2
(7)
where C and St are cover image and stego image, respectively. m and n are the size of cover
image. SSIM predicts the perceived quality of images and measures the similarity of cover
12. 9982 Multimedia Tools and Applications (2019) 78:9971–9989
image and stego image. The results of SSIM are defined by:
SSIM(I1, I2) =
(2μxμy + C1)(2σxy + C2)
(μ2
x + μ2
y + C1)(σ2
x + σ2
y + C2)
(8)
where σx and σy are the mean intensities of x and y, σ2
x and σ2
y are the variances of x and
y, σxy is the co-variance of x and y, respectively. The averages of x and y are μy and μx,
C1 and C2 are the variables to stabilize the division with weak denominator. The results of
PSNR and SSIM measures after embedding different size of messages are shown in Table 4.
This table also demonstrates the number of channels (RGB) that used in embedding process.
The sizes of channels are almost same and show the proposed technique uses all channels
of cover image in embedding secure messages. Figure 7 illustrates the PSNR and SSIM
measures of 100 cover images after embedding secure message.
4.2 Robustness against attacks
The considerable parameter of proposing a steganography method is robustness against
attacks. Generally, steganography hides a secure message in cover image and it can happen
that some parts of cover image destroyed accidentally or changed by the attackers. Accord-
ing to these problems, proposed method should be resisted against any destruction. To test
the robustness of proposed method, this section first embeds Baboon (256×256) image as a
secure message in Lena and Peppers images, then apply cropping attack and salt peppers
noise on stego images. Figure 8 shows the reconstructed secret message after these attacks.
This paper uses SSIM, BER and NCC measures to calculate the destruction of secure mes-
sage after extracting it from attacked stego images. The results of these measures are shown
in Table 5. In this table cover images are 512 × 512 and message (Baboon) is 256 × 256.
According to the results, proposed method can be resist against some image processing
attacks.
Fig. 8 Extracted Baboon secret message from stego images after Cropped and Salt peppers noise attacks,
a Lena 1024 × 1024, b Peppers 512 × 512, c Crop 100 × 100, d Extracted secure image after crop attack, e
Salt peppers noise (parameter = 0.02), f Extracted secure image after salt peppers noise attack
13. Multimedia Tools and Applications (2019) 78:9971–9989 9983
Fig. 9 Histogram analyses for RGB channels, a Cover image (Lena 1024 × 1024), b Stego image after
embedding 77244 bits, c Cover image, (Lena 512 × 512), d Stego image after embedding 9744 bits
4.3 Histogram analysis
Image histogram is an useful tool in image processing field that used to show the number
of pixels in images and their intensity values. In images steganography, histogram is used
to investigate cover images after embedding process and it shows the distribution of secure
message in cover images’ channels. This paper embeds 77244 bits and 9744 bits in two dif-
ferent sizes of cover image to compare the results of histogram. The comparison results are
shown in Fig. 9. This figure shows that the histograms of each cover image are very simi-
lar with their stego images and the distortion of Lena image is acceptable after embedding
different size of secure messages.
4.4 Key space analysis
Key space is the important part of encryption methods and shows the capability of methods
against brute force attack. The key space of proposed algorithm contains two different parts.
First part is the keys which used in the new 3d sine map. The initial conditions of this map
are three double keys (x0, y0, z0) and the size of each initial key is 10−14. The computational
precision of control parameters (δ, η and κ) are 3 × 10−14. Therefore, the general key space
15. Multimedia Tools and Applications (2019) 78:9971–9989 9985
Table 7 Comparison of proposed method with other gray scale images schemes
Method Secret size Cover image PSNR SSIM NCC
Su et al. [38] 32 × 32 Lena 36.3521 0.9889 1
Airplane 36.3160 0.9856 1
Peppers 36.6869 0.9682 1
Thabit et al. [43] 49152 bits Lena 43.29 − −
Airplane 40.27 − −
Baboon 34.33 − −
Peppers 41.71 − −
Sajasi et al. [36] 256 × 256 Lena 47.78 − −
Baboon 49.98 − −
Kanan et al. [19] 256 × 256 Lena 45.12 − −
Airplane 45.18 − −
Peppers 45.13 − −
Baboon 45.12 − −
Subhedar et al. [42] 256 × 256 Lena 49.0369 0.9963 0.9996
Airplane 49.2608 0.9971 0.9997
Peppers 50.1480 0.9966 0.9997
Baboon 37.7031 0.9917 0.9966
Splash 54.8019 0.9975 0.9996
Proposed method 256 × 256 Lena 53.2145 0.9981 0.9995
Airplane 52.6841 0.9992 0.9998
Peppers 53.0574 0.9995 0.9991
Baboon 52.9524 0.9986 0.9987
Splash 53.1447 0.9989 0.9993
of 3d sine map is 3×46+3×48 = 282 bits. Second part of key space is the control param-
eters (ω, σ and θ) which used in (5). The total key space of these parameters is 138 bits.
According to these parts, we can conclude the main key space of proposed steganography
is 282 + 138 = 420 bits. This key length is large enough to defeat brute force attacks.
5 Comparison with similar methods
This article selects two types of existing method to compare with proposed steganography.
First types of articles choose color images from Internet and public dataset like USC-SIPI-
ID [9]. Table 6 demonstrates the comparison results of PSNR and SSIM between proposed
method and existing method. In this table message size is 8 kb. Seconed types of meth-
ods have used transforms and gray scale images in embedding and extracting process. The
grayscale images that used for comparison are in UCID database [37]. Table 7 illustrates
the comparison results of PSNR, SSIM and NCC between proposed method and similar
methods. This paper compares the key space of proposed methods with similar steganog-
raphy methods in Table 8. The results of these tables show that the proposed method has
16. 9986 Multimedia Tools and Applications (2019) 78:9971–9989
Table 8 Key space comparison
of the proposed method with
other schemes
Method Key length (bits) Key space
Parah et al. [32] 57 257
Hennawy et al. [10] 128 2128
Muhammad et al. [31] 216 2216
Proposed method 420 2420
good performance after embedding secure message in two types of images and key space of
presented algorithm is higher than some existing methods.
6 Conclusion
This paper proposed a new transform domain image steganography method based on 3d
sine chaotic map. The chaotic map enhances the security of proposed steganography and
increases the key space. The pixels of cover image are selected by the outputs of chaotic
map to embed secure message bits. Bifurcation diagram and histogram analysis show the
chaotic behavior of 3d sine map and the results of statistical tests present the randomness
of this map. Cross correlation and auto correlation show the best interval for generated
sequences. However, proposed algorithm uses integer wavelet transforms in embedding and
extracting processes, and it is applied on cover and stego images. This transform uses the
integer coefficients to increase the capability of proposed method in extracting process.
Experimental results show acceptable imperceptibility of proposed method based on PSNR
and SSIM measures. Proposed scheme also has large key space and good robustness against
some image-processing attacks. Comparison results between proposed algorithm and some
existing schemes show that the proposed steganography has good performance and quality
in embedding and extracting processes.
Compliance with Ethical Standards
Conflict of interests All authors declare that they have no conflict of interest.
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps
and institutional affiliations.
References
1. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on
dna encoding. Opt Laser Technol 95:94–99
2. Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimed Tools Appl
30(1):55–88
3. Barani MJ, Ayubi P, Jalili F, Valandar MY, Azariyun E (2015) Image forgery detection in contourlet
transform domain based on new chaotic cellular automata. Secur Commun Netw 8(18):4343–4361
4. Belazi A, El-Latif AAA, Diaconu A-V, Rhouma R, Belghith S (2017) Chaos-based partial image
encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50
5. Chai X (2017) An image encryption algorithm based on bit level brownian motion and new chaotic
systems. Multimed Tools Appl 76(1):1159–1175
6. Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between
singular value decomposition and randomized singular value decomposition-based watermarking. In:
Intelligent techniques in signal processing for multimedia security. Springer, pp 133–149
17. Multimedia Tools and Applications (2019) 78:9971–9989 9987
7. Chen X, Gao G, Liu D, Xia Z (2016) Steganalysis of lsb matching using characteristic function moment
of pixel differences. China Commun 13(7):66–73
8. Chen L, Zhao J (2017) Robust contourlet-based blind watermarking for depth-image-based rendering 3d
images. Signal Process Image Commun 54:56–65
9. Cheng W-C, Pedram M (2004) Chromatic encoding: a low power encoding technique for digital visual
interface. IEEE Trans Consum Electron 50(1):320–328
10. El Hennawy HM, Omar AE, Kholaif SM (2015) Lea: link encryption algorithm proposed stream cipher
algorithm. Ain Shams Eng J 6(1):57–65
11. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun
Nonlinear Sci Numer Simul 19(6):1898–1907
12. Ghebleh M, Kanso A, Stevanović D (2017) A novel image encryption algorithm based on piecewise
linear chaotic maps and least squares approximation. Multimedia Tools and Applications 77(6):7305–
7326
13. Gutub AA-A et al (2010) Pixel indicator technique for rgb image steganography. J Emerg Technol Web
Intell 2(1):56–64
14. Hilborn RC (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers, Oxford
University Press on Demand, Oxford
15. Hu T, Liu Y, Gong L-H, Guo S-F, Yuan H-M (2017) Chaotic image cryptosystem using dna deletion
and dna insertion. Signal Process 134:234–243
16. Hu T, Liu Y, Gong L-H, Ouyang C-J (2017) An image encryption scheme combining chaos with cycle
operation for dna sequences. Nonlinear Dyn 87(1):51–66
17. Hussain M, Wahab AWA, Ho AT, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel
value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57
18. Jassim FA A novel steganography algorithm for hiding text in image using five modulus method,
arXiv:1307.0642
19. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capac-
ity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–
6130
20. Kumar M, Kumar S, Budhiraja R, Das M, Singh S (2017) A cryptographic model based on logistic map
and a 3-d matrix. J Inf Secur Appl 32:47–58
21. Lalitha R, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric
key and bit shuffle technique. In: Computer communication, networking and internet security. Springer,
pp 261–270
22. Lee C-F, Weng C-Y, Chen K-C (2017) An efficient reversible data hiding with reduplicated exploiting
modification direction using image interpolation and edge detection. Multimed Tools Appl 76(7):9993–
10016
23. Leihong Z, Zilan P, Luying W, Xiuhua M (2016) High-performance compression and double cryp-
tography based on compressive ghost imaging with the fast fourier transform. Opt Lasers Eng
86:329–337
24. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear
Dyn 87(1):127–133
25. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big
data storage in cloud computing. Inf Sci 387:103–115
26. Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using
pixel value adjusting feature. Multimed Tools Appl 76(11):13025–13046
27. Martı́nez-González RF, Dı́az-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina
R (2016) A steganographic method using bernoulli’s chaotic maps. Comput Electr Eng 54:435–
449
28. Moosazadeh M, Ekbatanifard G (2017) An improved robust image watermarking method using dct and
ycocg-r color space. Optik-Int J Light Electron Opt 140:975–988
29. Muhammad K, Ahmad J, Sajjad M, Zubair M Secure image steganography using cryptography and
image transposition, arXiv:1510.04413
30. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method
(m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimed Tools Appl
75(22):14867–14893
31. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography
using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626
32. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer
security data hiding technique. Comput Electr Eng 40(1):70–82
18. 9988 Multimedia Tools and Applications (2019) 78:9971–9989
33. Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Hiding in encrypted images: a three tier security data
hiding technique. Multidim Syst Sign Process 28(2):549–572
34. Parah SA, Sheikh JA, Loan NA, Bhat G (2017) A robust and computationally efficient digital water-
marking technique using inter block pixel differencing. In: Multimedia forensics and security. Springer,
pp 223–252
35. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery
based on overlapping embedding strategy. Signal Process 138:280–293
36. Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility
function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389
37. Schaefer G, Stich M (2004) Ucid: an uncompressed color image database. Storage Retr Methods Appl
Multimed 5307:472–480
38. Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based
on qr decomposition. Multimed Tools Appl 72(1):987–1009
39. Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Soft Comput
22(1):91–106
40. Su Q, Wang G, Zhang X, Lv G, Chen B (2017) An improved color image watermarking algorithm based
on qr decomposition. Multimed Tools Appl 76(1):707–729
41. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey.
Comput Sci Rev 13:95–113
42. Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and
qr factorization. Comput Electr Eng 54:406–422
43. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical
images. Digit Signal Process 38:77–94
44. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified
logistic chaotic map for color images. J Inf Secur Appl 34:142–151
45. Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of fridrich’s chaotic image encryption scheme.
Signal Process 132:150–154
Milad Yousefi Valandar is a young researcher of computer engineering and security in Islamic Azad Uni-
versity, Iran. He received B.E. and M.Sc. in software engineering from Islamic Azad University, Urmia,
Iran. His research interests include digital media security, image and video steganography, image and video
watermarking, chaos theory and fractal, hash functions, image encryption and authentication.
19. Multimedia Tools and Applications (2019) 78:9971–9989 9989
Milad Jafari Barani was born in Naqadeh, Iran in 1985. He received B.E. degree in computer engineer-
ing from Islamic Azad University, Orumiyeh, Iran, respectively M.Sc. Degree in artificial intelligence in
2014 from Qazvin branch, Islamic Azad University, Qazvin, Iran. His research interests include Information
Hiding, Image Authentication, Watermarking and image security.