Open Access Open Access  Restricted Access Subscription or Fee Access

Multi-level Security Technique Using Steganography with Chaotic Encryption

S. S. Nassar, N. M. Ayad, H. M. Kollash, O. S. Faragallah, M. A. M. El-Bendary, F. E. Abd-Elsamie

Abstract


This paper proposes two novel multi-layer security techniques that exploit the advantages of two important security techniques – steganography and image encryption. Image steganography technique presents an important task for the data transmission; it provides transferring the embedded information to the destination without being detected by concealing the existence of hidden secret data inside a cover image. Unlike the text, images have
different characteristics such as bulk data capacity and high data redundancy, so the encryption of images is different from that used with texts. This paper presents two powerful encrypted steganogrophic techniques using the chaotic encryption. The chaos based cryptographic algorithms are considered an efficient and secured image encryption technique. In this work, the steganography firstly, is used with 2D Logistic map and secondly used with Chaotic Baker map as two proposed multi-layer security techniques. Once the secret image is embedded in a cover image using Least Significant Bit (LSB) based Steganography it is encrypted using 2D Logistic map or Chaotic Baker map to produce a higher security algorithm. Different image analyses were verified and the results of the algorithms prove that, the proposed techniques can be implemented practically and efficiently to protect a high sensitive and secure data such as nuclear
and military information.


Keywords


Steganography, Image Encryption, LSB Replacement, 2D Logistic Map, Chaotic Baker Map.

Full Text:

PDF

References


Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/

tmoerl/privtech.pdf.

Currie, D.L. & Irvine, C.E., “Surmounting the effects of lossy compression on Steganography”, 19th National Information Systems Security Conference, 1996.

Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998.

A H M Kamal, “Steganography: Securing Message in wireless network”, International Journal of Computers & Technology, Volume 4 No. 3, March-April, 2013.

Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002.

Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.

Yaobin Mao, Guanrong Chen, “Chaos-Based Image Encryption”, Springer Link, Handbook of Geometric Computing, pp 231-265, 2005.

N.K. Pareek, Vinod Patidar, K.K. Sud, “Image encryption using chaotic logistic map”, Sciencedirect, Image and Vision Computing, 2006.

G. Srividya, P. Nandakumar, "A Triple-Key chaotic image encryption method," Communications and Signal Processing (ICCSP), 2011 International Conference on , pp.266-270, 10-12 Feb. 2011.

Musheer Ahmad, M. Shamsher Alam, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal on Computer Science and Engineering, Vol.2(1), 2009.

J.R. Krenn, “Steganography and Steganalysis”, January 2004.

Deshpande Neeta, KamalapurSnehal, Daisy Jacobs, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, 2004.

Fridrich, J.,“Symmetric ciphers based on two-dimensional chaotic maps”, International Journal of Bifurcation and Chaos, 8, 1259–1284, (1998).

M. A. M. El-Bendary, A. E. Abou-El-azm, N. A. El-Fishawy,F. Shawki, M. A. R. El-Tokhy, and H. B. Kazemian,” Performance of the Audio Signals Transmission over Wireless Networks with the Channel Interleaving Considerations”, EURASIP Journal on Audio, Speech, and Music Processing, 2012.

K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05/$20.00 ©2005.

MamtaJuneja,Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in Communication and Computing, 2009.

BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-6/08/$20.00 ©2008.

G. R. Chen, Y. B. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat map," Chaos, Solitons and Fractals, Vol. 21, pp. 749-61, Mar. 2004.

G. R. Chen, Y. B. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat map," Chaos, Solitons and Fractals, Vol. 21, pp. 749-61, Mar. 2004.

N. K. Pareek, V. Patidar, and K. K. Sud, "Image encryption using chaotic logistic map," Image Vision Comput, Vol. 24, pp. 926-34, Sept. 2006.

H. S. Kwok, K. Wallace, and S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation," Chaos, Solitons and Fractals, Vol. 32, pp. 1518-29, Apr. 2007.

T. Gao, Q. Gu, and Z. Chen, "A new image encryption algorithm based on hyper-chaos," Phys. Lett. A, Vol. 372, pp. 394-400, Apr. 2008.

T. Gao, and Z. Chen, "Image encryption based on a new total shuffling algorithm," Chaos, Solitons and Fractals, Vol. 38, pp. 213- 20, Jan. 2008.

C. K. Huang, and H. H. Nien, "Multi chaotic systems based pixel shuffle for image encryption," Optical communications, Vol. 282, pp. 2123-7, Feb. 2009.

X. Y. Wang, and Q. Yu, "A block encryption algorithm based on dynamic sequences of multiple chaotic systems," Commun Nonlinear Sci Numer Simulat, Vol. 14, pp. 574-81, 2009.

D. Chattopadhyay, M. K. Mandal, and D. Nandi, "Robust chaotic image encryption based on perturbation technique," ICGST- GVIP, Vol. 11, pp. 41-50, Apr. 2011.

Arun A.S., George M. Joseph, “High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption”, IOSR Journal of Computer Engineering (IOSR-JCE) Volume 12, Issue 5, PP 49-54, (Jul. -Aug. 2013).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.