Skip to main content

A Hybrid Approach for Data Hiding Through Chaos Theory and Reversible Integer Mapping

  • Conference paper
  • First Online:
Computational Intelligence, Cyber Security and Computational Models

Abstract

Steganography is the science which deals with hiding the message so that the intruder cannot even detect its existence. This paper proposes an efficient approach which embeds data into the cover image which is in the frequency domain. DCT is applied to the cover image using integer mapping and the encrypted secret is embedded into it using 3, 3, 2 LSB substitution. The encryption is achieved through chaos theory and ceaser cipher technique. The integer mapping is a method which transforms a given image into its DCT transform and transforms back into the spatial domain without any loss. The proposed method provides a high level of security since secret data is encrypted using chaos theory and embedded into DCT transformed cover image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–316 (1996)

    Article  Google Scholar 

  2. Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141, 123–138 (2011)

    Article  Google Scholar 

  3. Zhao, Z.-J., Chen, H.-X., Chen, M.-S.: Integer Implementation of four-dimensional matrix DCT. Jilin Daxue Xuebao (Gongxueban)/J. Jilin University (Engineering and Technology Edition) 38(3), 700–703 (2008)

    Google Scholar 

  4. Plonka, G.: A global method for invertible integer DCT and integer wavelet algorithms. Appl. Comput. Harmonic Anal. 16(2), 90–110 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  5. Gulve, A.K, Joshi, M.S.: An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math. Problems Eng. 684824 (2015)

    Google Scholar 

  6. Koikara, R., Deka, D.J., Gogoi, M., Das, R.: A novel distributed image steganography method based on block-DCT. Lecture Notes Electr. Eng. 315, 423–435 (2014)

    Article  Google Scholar 

  7. Vaithiyanathan, V., Karthikeyan, B., Venkatraman, B.: Image segmentation based on modified Tsallis entropy. Contemp. Eng. Sci. 7(9–12), 523–529 (2014)

    Google Scholar 

  8. Bandyopadhyay, D., Dasgupta, K., Mandal, J.K., Paramartha, D.: A novel secure image steganography method based on Chaos theory in spatial domain. Int. J. Secur. Privacy Trust Manage. 3(1) (2014)

    Google Scholar 

  9. Aziz, M., Tayarani N.M.H., Afsar, M.: A cyclic chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics (2015)

    Google Scholar 

  10. Karthikeyan, B., Chakravarthy, J., Vaithiyanathan, V.: An enhanced Hill cipher approach for image encryption in steganography. Int. J. Electron. Secur. Digit. Forensics 5(3–4), 178–187 (2013)

    Article  Google Scholar 

  11. Thenmozhi, S., Chandrasekaran, M.: A novel technique for image steganography using nonlinear chaotic map. In: 7th International Conference on Intelligent Systems and Control, ISCO (2013)

    Google Scholar 

  12. Lin, Y.-K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interf. 36(5), 855–862 (2014)

    Article  Google Scholar 

  13. Sudha, K.L., Prasad, M.: Chaos image encryption using pixel shuffling with Henon map. Proc. Elixir Elec. Engg 38, 4492–4495 (2011)

    Google Scholar 

  14. Zaghbani, S., Rhouma, R.: Data hiding in spatial domain image using chaotic map. In: 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO, 6552626 (2013)

    Google Scholar 

  15. Yusong, Y., Qingyun, S.: Reversible DCT mapping integers to integers and lossless image compression. Ruan Jian Xue Bao/J. Softw. 11(5), 620–627 (2000)

    Google Scholar 

  16. Hao, P., Shi, Q.: Matrix factorizations for reversible integer mapping. IEEE Trans. Signal Process. 49(10), 2314–2324 (2001)

    Article  MathSciNet  Google Scholar 

  17. Karthikeyan, B., Ramakrishnan, S., Vaithiyanathan, V., Sruthi, S., Gomathymeenakshi, M.: An improved steganography technique using LSB replacement on a scanned path image. Int. J. Network Secur. 16(1), 14–18

    Google Scholar 

  18. Qian, Z., Zhang, X.: Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85(2), 309–313 (2012)

    Article  MathSciNet  Google Scholar 

  19. Fridrich, J., Du, R., Meng, L.: Steganalysis and LSB encoding in color images. In: Proceedings of ICME 2000, N. Y., USA

    Google Scholar 

  20. Zhang, Y., Zuo, F., Zhai, Z., Xiaobin, C.: A new image encryption algorithm based on multiple chaos system. In: Proceedings of the International Symposium on Electronic Commerce and Security (ISECS ’08), 2008, pp. 347–350

    Google Scholar 

  21. Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: A spatial domain image steganography technique based on plane bit substitution method. Global J. Comput. Sci. Technol. (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. S. V. Nithin Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Nithin Kumar, S.S.V., Charan, G.S., Karthikeyan, B., Vaithiyanathan, V., Rajasekhar Reddy, M. (2016). A Hybrid Approach for Data Hiding Through Chaos Theory and Reversible Integer Mapping. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics