Multimedia Tools and Applications

, Volume 76, Issue 6, pp 7849–7867 | Cite as

A novel method for digital image steganography based on a new three-dimensional chaotic map

  • Ami Sharif
  • Majid MollaeefarEmail author
  • Mahboubeh Nazari


This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a hot topic in recent researches. The proposed scheme possess novelties and advantageous such as: 1) Introducing a novel 3-dimensional chaotic map (LCA map) with strong chaotic characteristics and maximum Lyapunov exponent 20.58, which is used for generating three chaotic sequences, each of them represents the number of row, column, and colour component, respectively. 2) Utilizing random selection procedure for selecting subsequences with length of 2L, which L is the length of secret message 3) Specifying L pairs of triples host positions for embedding LSBs and MSBs of secret message by using three high level chaotic maps. 4) Entering some parameters dependent on elementary initial values, host image, and secret message features as a key point for adding additional layer of security alongside providing high sensitivity. 5) Providing high capacity for embedding secret message, which is equal to 50 % of whole image capacity (M × N × 12). The proposed method could be applied in different criterion such as, confidential communication and data storing, protection of data alteration, and etc. Our experimental results guarantees that our scheme is not only robust against differential attacks, but also has promising results such as highly sensitive keys, Quality index, PSNR, MSE, and hiding capacity as shown in statistical security analysis.


Information hiding LSBs 3-dimensional chaotic map Statistical analysis Imperceptibilty 


  1. 1.
    Alam S, Kumar V, Siddiqui W, Ahmad M (2014) Key dependent image steganography using edge detection. In: Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, pp 85–88Google Scholar
  2. 2.
    Alam S, Kumar V, Siddiqui WA, Ahmad M (2014) Key dependent image steganography using edge detection. In: Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, pp 85–88Google Scholar
  3. 3.
    Anees A et al (2014) A technique for digital steganography using chaotic maps. Nonlinear Dyn 75(4):807–816CrossRefGoogle Scholar
  4. 4.
    Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):1–12CrossRefGoogle Scholar
  5. 5.
    Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput 71(8):3163–3180CrossRefGoogle Scholar
  6. 6.
    Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimed Tools Appl 75(1):181–197CrossRefGoogle Scholar
  7. 7.
    Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst 39(8):1–10CrossRefGoogle Scholar
  8. 8.
    Aziz M, Tayarani-N MH, Afsar M (2015) A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn 80(3):1271–1290CrossRefGoogle Scholar
  9. 9.
    Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Priv Trust Manag (IJSPTM) 3(1):11–22CrossRefGoogle Scholar
  10. 10.
    Bilal M, Imtiaz S, Abdul W, Ghouzali S, Asif S (2014) Chaos based Zero-steganography algorithm. Multimed Tools Appl 72(2):1073–1092CrossRefGoogle Scholar
  11. 11.
    Das P, Kar N (2014) A DNA based image steganography using 2D chaotic map. In: Electronics and Communication Systems (ICECS), 2014 International Conference on. IEEE, pp 1–5Google Scholar
  12. 12.
    Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907CrossRefGoogle Scholar
  13. 13.
    Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34CrossRefGoogle Scholar
  14. 14.
    Judge J (2001) Steganography: past, present, future. SANS white paperGoogle Scholar
  15. 15.
    Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302MathSciNetCrossRefGoogle Scholar
  16. 16.
    Mollaeefar M, Sharif A, Nazari M (2015) A novel encryption scheme for colored image based on high level chaotic maps. Multimedia Tools Appl 1–23Google Scholar
  17. 17.
    Potdar VM, Han S, Chang E (2005) Fingerprinted secret sharing steganography for robustness against image cropping attacks. In: Industrial Informatics, 2005. INDIN’05. 2005 3rd IEEE International Conference on. IEEE, pp 717–724Google Scholar
  18. 18.
    Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44CrossRefGoogle Scholar
  19. 19.
    Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Center for Information Technology IntegrationGoogle Scholar
  20. 20.
    Roy R, Sarkar A, Changder S (2013) Chaos based edge adaptive image steganography. Procedia Technol 10:138–146CrossRefGoogle Scholar
  21. 21.
    Sabery KM, Yaghoobi M (2008) A simple and robust approach for image hiding using chaotic logistic map. In Advanced Computer Theory and Engineering, 2008. ICACTE’08. International Conference on. IEEE, pp 623–627Google Scholar
  22. 22.
    Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian/Arabic text steganography. In: Computer and Information Science, 2006 and 2006 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse. ICIS-COMSAR 2006. 5th IEEE/ACIS International Conference on. IEEE, pp 310–315Google Scholar
  23. 23.
    Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113CrossRefzbMATHGoogle Scholar
  24. 24.
    Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Ami Sharif
    • 1
  • Majid Mollaeefar
    • 1
    Email author
  • Mahboubeh Nazari
    • 2
  1. 1.Department of Computer and Information TechnologyInternational University of Imam RezaMashhadIran
  2. 2.Department of MathematicsFerdowsi University of MashhadMashhadIran

Personalised recommendations