Abstract
Steganography is the science which deals with hiding the message so that the intruder cannot even detect its existence. This paper proposes an efficient approach which embeds data into the cover image which is in the frequency domain. DCT is applied to the cover image using integer mapping and the encrypted secret is embedded into it using 3, 3, 2 LSB substitution. The encryption is achieved through chaos theory and ceaser cipher technique. The integer mapping is a method which transforms a given image into its DCT transform and transforms back into the spatial domain without any loss. The proposed method provides a high level of security since secret data is encrypted using chaos theory and embedded into DCT transformed cover image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–316 (1996)
Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2011)
Zhao, Z.-J., Chen, H.-X., Chen, M.-S.: Integer Implementation of four-dimensional matrix DCT. Jilin Daxue Xuebao (Gongxueban)/J. Jilin University (Engineering and Technology Edition) 38(3), 700–703 (2008)
Plonka, G.: A global method for invertible integer DCT and integer wavelet algorithms. Appl. Comput. Harmonic Anal. 16(2), 90–110 (2004)
Gulve, A.K, Joshi, M.S.: An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math. Problems Eng. 684824 (2015)
Koikara, R., Deka, D.J., Gogoi, M., Das, R.: A novel distributed image steganography method based on block-DCT. Lecture Notes Electr. Eng. 315, 423–435 (2014)
Vaithiyanathan, V., Karthikeyan, B., Venkatraman, B.: Image segmentation based on modified Tsallis entropy. Contemp. Eng. Sci. 7(9–12), 523–529 (2014)
Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Paramartha, D.: A novel secure image steganography method based on Chaos theory in spatial domain. Int. J. Secur. Privacy Trust Manage. 3(1) (2014)
Aziz, M., Tayarani N.M.H., Afsar, M.: A cyclic chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics (2015)
Karthikeyan, B., Chakravarthy, J., Vaithiyanathan, V.: An enhanced Hill cipher approach for image encryption in steganography. Int. J. Electron. Secur. Digit. Forensics 5(3–4), 178–187 (2013)
Thenmozhi, S., Chandrasekaran, M.: A novel technique for image steganography using nonlinear chaotic map. In: 7th International Conference on Intelligent Systems and Control, ISCO (2013)
Lin, Y.-K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interf. 36(5), 855–862 (2014)
Sudha, K.L., Prasad, M.: Chaos image encryption using pixel shuffling with Henon map. Proc. Elixir Elec. Engg 38, 4492–4495 (2011)
Zaghbani, S., Rhouma, R.: Data hiding in spatial domain image using chaotic map. In: 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO, 6552626 (2013)
Yusong, Y., Qingyun, S.: Reversible DCT mapping integers to integers and lossless image compression. Ruan Jian Xue Bao/J. Softw. 11(5), 620–627 (2000)
Hao, P., Shi, Q.: Matrix factorizations for reversible integer mapping. IEEE Trans. Signal Process. 49(10), 2314–2324 (2001)
Karthikeyan, B., Ramakrishnan, S., Vaithiyanathan, V., Sruthi, S., Gomathymeenakshi, M.: An improved steganography technique using LSB replacement on a scanned path image. Int. J. Network Secur. 16(1), 14–18
Qian, Z., Zhang, X.: Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85(2), 309–313 (2012)
Fridrich, J., Du, R., Meng, L.: Steganalysis and LSB encoding in color images. In: Proceedings of ICME 2000, N. Y., USA
Zhang, Y., Zuo, F., Zhai, Z., Xiaobin, C.: A new image encryption algorithm based on multiple chaos system. In: Proceedings of the International Symposium on Electronic Commerce and Security (ISECS ’08), 2008, pp. 347–350
Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: A spatial domain image steganography technique based on plane bit substitution method. Global J. Comput. Sci. Technol. (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Nithin Kumar, S.S.V., Charan, G.S., Karthikeyan, B., Vaithiyanathan, V., Rajasekhar Reddy, M. (2016). A Hybrid Approach for Data Hiding Through Chaos Theory and Reversible Integer Mapping. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_45
Download citation
DOI: https://doi.org/10.1007/978-981-10-0251-9_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0250-2
Online ISBN: 978-981-10-0251-9
eBook Packages: EngineeringEngineering (R0)