The Steganography Based On Chaotic System for Random LSB Positions
SBOCSFRLSBP
DOI:
https://doi.org/10.31185/wjcm.95Keywords:
Chaotic System, Gray Image, Stego-image, LSB Technique.Abstract
The objective of hiding text in an image is hiding text without raising suspicions that the image contains a hidden message or text, which leads to protecting and maintaining text confidentiality. The previous hiding methods have problems in capacity, randomization, and imperceptibility. This paper will be solved some of these problems; we suggested a new method for hiding text in an image. Firstly, encrypting the text by the AES-192 bit algorithm for obtaining a secret message. When the initial key of the AES-192 (bit) algorithm is generated by a chaotic system for randomness purposes, secondly, hiding the secret message is into a gray image for obtaining a stego-image. The hiding step is based on a proposed map that chooses from the last round of key expansion in the AES-192 algorithm. This map represented random positions of LSB in each byte of the gray image. The experimental result of this method proved a successful method based on metric criteria. Also, this method is the very speed for hiding ciphertext in the gray image as well as extracting ciphertext from the gray image. Also, it is very safe because it is difficult for attackers to distinguish between the original image and the stego image therefore the correlation between the original image and the stego- image is very close to 1.
References
Amrita Bhatnagar, Shweta Chaku and Monica Sainger, “Hiding Compressed and Encrypted Data byusing a Technique of Steganography,” International Journal of Engineering Re-search & Technology (IJERT). Volume 09, Issue 04 (April 2020) , DOI: 10.17577/IJERTV9IS040320.
Jammi Ashok, Y.Raju, S.Munishankaraiah and K.Srinivas, “Steganography: An Over-view,”International Journal of Engineering Science and Technology. Vol. 2(10), 2010, 5985-5992.
Milad Taleby Ahvanooey, Qianmu Li, Jun Hou, Ahmed Raza Rajput and Chen Yini, “Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis,” En-tropy 2019, 21(4), 355;doi.org/10.3390/e21040355.
Dalal N. Hmood, Khamael A. Khudhia , Mohammed S. Altaei, “A New Steganographic Method for Embedded Image In Audio File,” International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 .
K. Mustafa Sabah Taha, Mohd Shafry Mohd Rahim, Sameer abdulsattar lafta, Mohammed Mahdi Hashim,Hassanain Mahdi Alzuabidi , “Combination of Steganography and Cryp-tography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET 2019), IOP Conf. Series: Materials Science and Engineering 518 (2019) 052003 IOP Publishing ,doi:10.1088/1757-899X/518/5/052003.
Rawaa Hamza Ali, Jamal Mohamed Kadhim,” Text-based Steganography using Huffman Compression and AES Encryption Algorithm,” Iraqi Journal of Science, 2021, Vol. 62, No. 11, pp: 4110-4120, DOI:10.24996/ijs.2021.62.11.31.
Zainab N. Sultani and Ban N. Dhannoon, “Image and audio steganography based on indi-rect LSB,” Kuwait J.Sci., Vol.48, No. (4), October.2021, pp (1-12).
Abhinav Gupta, Divya Tiwari, Vineet Kumar, K. P. S. Rana and Seyedali Mirjalili ,"A Chaos–Infused Moth–Flame Optimizer,"Arabian Journal for Science and Engineering, 23 April 2022.
Ricard V. Soléa and JordiBascompteb, “Measuring chaos from spatial information,” Jour-nal of Theoretical Biology Volume 175, Issue 2, 21 July 1995, Pages 139-147.
Ziaur Rahman, Xun Yi, Ibrahim Khalil, and Mousumi Sumi, “Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security”. Electronics 2022, 1, 0.doi.org/10.3390/electronics1010000
Ray Huffaker, Marco Bittelli, and Rodolfo Rosa, “Nonlinear Time Series Analysis with R, ” Oxford Scholarship Online: February 2018, DOI:10.1093/oso/9780198782933.001.0001.
Lawande Q.V., Ivan B.R and Phodapkar S.D, “Chaos Based Cryptography, ” A new approach To Secure Communication, No. 258 , July 2005 .
Hussein L. Hussein, Ahmed A. Abbass, Sinan A. Naji, and Salam Al-augby a, Jasim H. Lafa “Hiding text in gray image using mapping technique, “Article in Journal of Physics Conference Series · May 2018, DOI: 10.1088/1742-6596/1003/1/012032.
Alaa Kadhim F And Rasha Subhi Ali“Hidden Encrypted Text Based On Secrete Map Equation And Bioinformatics Techniques,” Journal of Theoretical and Applied Infor-mation Technology, 15th January 2019. Vol.96. No 1.
Alaa Kadhim Farhan, Nadia M.G. Al-Saidi, Abeer Tariq Maolood, Fahimeh Nazarimehr and Iqtadar Hussain “Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder,” Entropy 2019, 21(10), 958,doi.org/10.3390/e21100958.
Jagan Raj Jayapandiyan, C. Kavitha and K. Sakthivel, “Enhanced Least Significant Bit Replacement Algorithm in spatial domain of Steganography using character sequence op-timization,” IEEE Access, August 5, 2020, doi: 10.1109/ACCESS.2020.3009234.
Ranyiah Wazirali, Waleed Alasmary, Mohamed Mahmoud And Ahmad, Alhindi, “An Optimized Steganography Hiding Capacity And Imperceptibly Using Genetic Algorithms,” IEEE Access, 2019, DOI 10.1109/ACCESS.2019.2941440.
Ali Salem Ali, Mohammed Sabbih Hamoud Al-Tamimi and Alaa Ahmed Abbood, “Se-cure Image Steganography through Multilevel Security,”International Journal of Innova-tion, Creativity and Change. Volume 11, Issue 1, 2020.
Mansoor Fateh, Mohsen Rezvani, and Yasser Iran,”A New Method of Coding for Ste-ganography Based on LSB Matching Revisited,”Hindawi Security and Communication Networks, 08 Feb 2021, Volume 2021, Article ID 6610678, doi.org/10.1155/2021/6610678.
Sachin Dhawan and Rashmi Gupta,” Analysis of various data security techniques of steganography: A survey,” Information Security Journal: A Global Perspective, 12 Aug 2020, Volume 30, 2021 - Issue 2, doi.org/10.1080/19393555.2020.1801911.
Mohammed Mahdi Hashim and Mohd Shafry Mohd Rahim,”Image Steganography Based On Odd/Even Pixels Distribution Scheme and Two Parameters Random Function”. Journal of Theoretical and Applied Information Technology, 30th November 2017. Vol.95. No 22.
Azhaar Akram Abdallah and Alaa Kadhim Farhan, ”A New Image Encryption Algorithm Based on Multi ChaoticSystem , ” Iraqi Journal of Science, 2022, Vol. 63, No. 1, pp: 324-337DOI: 10.24996/ijs.2022.63.1.31
Manohar N and Peetla Vijay Kumar ,”Data Encryption & Decryption Using Steganography , ” Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020) ,IEEE Xplore , Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2
Ammar Mohammed Ali And Alaa Kadhim Farhan ”Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document, ” in IEEE Access, vol. 8, pp. 27448-27458, 2020, doi: 10.1109/ACCESS.2020.2971779.
Nuha A. S. Alwan and Zahir M. Hussain,” Compressive Sensing with Chaotic Sequenc-es: An Application to Localization in Wireless Sensor Networks,” Wireless Personal Communications, IEEEAccess, 06 February 2019, doi:10.1109/ACCESS.2019.2941440.
Kaiser A. Reshak, Ban N. Dhannoon and Zainab N. Sultani,”Explicit feedback based movie recommendation system: A survey ," AIP Conference Proceedings 2290, 040009 (2020) , doi.org/10.1063/5.0027433.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Rusul Mansoor

This work is licensed under a Creative Commons Attribution 4.0 International License.