Advertisement

Implementation of Chaotic-Based Hybrid Method to Provide Double Layer Protection

  • Shreela Dash
  • Madhabananda Das
  • Mamatarani Das
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)

Abstract

In the modern era, Internet is the most widely used transmission medium. While transmitting any secret information through any public channel, then that may be hacked in between. So to send data to the receiver without any kind of damage, here we have proposed a hybrid method by using both the cryptography and steganography technique. The secret message is first encrypted by using chaotic neural network. For encrypting data, we used CNN because of its random nature which is very challenging for hackers to know about the secret information. The secret key decides the position to hide the encrypted data. Only authorized users share the secret key. The receiver finds the original message by using secret key and then decryption is performed. Our experiment shows that PSNR of our method is very high as the technique modifies lesser number of bits. This method provides good security and less distortion to original image.

Keywords

Chaotic neural network (CNN) Matrix encoding Least significant bit (LSB) 

References

  1. 1.
    Cheng-Hsing Yang And Shiuh-JengWang, “Transforming LSB Substitution for Image based Steganography in Matching Algorithms”, Journal Of Information Science And Engineering, 26, 1199–1212 (2010).Google Scholar
  2. 2.
    Abbas Cheddad, Condell, Kevin Curran, Paul McKevitt, F. Hartung, “Information hiding-a survey” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Volume: 87 Issue: 7, pp. I062–I078, July. 1999.Google Scholar
  3. 3.
    Jarno Mielikainen, “LSB matching revisited,” IEEE signal processing letters, vol. 13, no. 5, May 2006.Google Scholar
  4. 4.
    S. M. MasudKarim, Md. Saifur Rahman, Md. Ismail Hossain “A New Approach for LSB Based Image Steganography using Secret Key” Proceedings of 14th International Conference on Computer and Information Technology (ICCIT) 2011.Google Scholar
  5. 5.
    G. KarthigaiSeivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” International Conference on Computing, Electronics and Electrical Technologies [ICCEET] 2012, pp 1023–1027.Google Scholar
  6. 6.
    Qinhua Huang and Weimin Ouyang, “Protect Fragile Regions in Steganography LSB Embedding”, 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.Google Scholar
  7. 7.
    Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder “Chaos based Edge Adaptive Image Steganography” international Conference on Computational Intelligence (CIMTA), 2013, vol 10, pp. 138–146.Google Scholar
  8. 8.
    Rig Das, Themrichon Tuitthung, “A Novel Steganography Method For Image Based on Huffman Encoding”, IEEE, 2012.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Shreela Dash
    • 1
  • Madhabananda Das
    • 2
  • Mamatarani Das
    • 1
  1. 1.Department of Computer Science and EngineeringC. V. Raman College of EngineeringBhubaneswarIndia
  2. 2.School of Computer EngineeringKIIT UniversityPatia, BhubaneswarIndia

Personalised recommendations