Advertisement

Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption

  • Shreela DashEmail author
  • M. N. Das
  • Mamatarani Das
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 711)

Abstract

Information security is one of the challenging problems nowadays, and to solve this problem, a new algorithm which provides double layer security is proposed, by combining region-based steganography with chaotic encryption. Region-based steganography is the technique of protecting the hidden information in certain regions of interest, which is most efficient for data hiding. One of them is the edge region in image, which is most effective for data hiding. For encrypting data, we used CNN because of its random nature which is very challenging for hackers to know about the secret information. In the proposed work, the secret data are first encoded using CNN, and then, the scrambled message is embedded inside the edge region of cover image using matrix encoding scheme, which provides high security. The complete procedure is instigated in MATLAB, and the result analysis is given, which shows the strength of the technique.

Keywords

Chaotic neural network (CNN) Matrix encoding Region-based steganography 

References

  1. 1.
    Shreela Dash, Mamatarani Das, Kartik Chandra Jena, “Region Based Data Hiding For High Payload”, International Journal of Computer Science and Information Technologies, Vol. 6 (1), 2015, 913–919.Google Scholar
  2. 2.
    Abbas Cheddad, oan Condell, Kevin Curran, Paul McKevitt, F. Hartung, “Information hiding-a survey” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Volume: 87 Issue:7, pp. I062–I078, July. 1999.Google Scholar
  3. 3.
    JarnoMielikainen, “LSB matching revisited,” IEEE signal processing letters, vol. 13, no. 5, May 2006.Google Scholar
  4. 4.
    G. Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” International Conference on Computing, Electronics and Electrical Technologies [ICCEET} 2012, pp 1023–1027.Google Scholar
  5. 5.
    S. M. MasudKarim, Md. SaifurRahman, Md. Ismail Hossain “A New Approach for LSB Based Image Steganography using Secret Key” Proceedings of 14th International Conference on Computer and Information Technology (ICCIT) 2011.Google Scholar
  6. 6.
    Qinhua Huang and WeiminOuyang, “Protect Fragile Regions in Steganography LSB Embedding”, 3rd International Symposium on Knowledge Acquisition and Modelling, 2010.Google Scholar
  7. 7.
    G. KarthigaiSeivi, Leon Mariadhasan, K. L. Shunmuganathan “Steganography Using Edge Adaptive Image” International Conference on Computing, Electronics and Electrical Technologies [ICCEET} 2012, pp 1023–1027.Google Scholar
  8. 8.
    Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder “Chaos based Edge Adaptive Image Steganography” international Conference on Computational Intelligence (CIMTA), 2013, vol 10, pp. 138–146.Google Scholar
  9. 9.
    John Canny, “A Computational Approach to Edge Detection” IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. -8, No. 6, November 1986.CrossRefGoogle Scholar
  10. 10.
    Rig Das, Themrichon Tuitthung, “A Novel Steganography Method For Image Based on Huffman Encoding”, IEEE, 2012.Google Scholar
  11. 11.
    N.K Kamila, H. Rout, N. Dash, “Stego-Cryptography Using Chaotic Neural Network”, American Journal Of Signal Processing, 2014.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of CSEC. V. Raman College of EngineeringBhubaneswarIndia
  2. 2.School of Computer ScienceKIIT UniversityBhubaneswarIndia

Personalised recommendations