The Steganography Based On Chaotic System for Random LSB Positions

SBOCSFRLSBP

Authors

  • Rusul Mansoor Al-Amri Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq , College of Nursing, University of Al-Ameed Karbala, PO No: 198 Iraq
  • Dalal N. Hamood Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq
  • Alaa Kadhim Farhan Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq

DOI:

https://doi.org/10.31185/wjcm.95

Keywords:

Chaotic System, Gray Image, Stego-image, LSB Technique.

Abstract

The objective of hiding text in an image is hiding text without raising suspicions that the image contains a hidden message or text, which leads to protecting and maintaining text confidentiality. The previous hiding methods have problems in capacity, randomization, and imperceptibility. This paper will be solved some of these problems; we suggested a new method for hiding text in an image. Firstly, encrypting the text by the AES-192 bit algorithm for obtaining a secret message. When the initial key of the AES-192 (bit) algorithm is generated by a chaotic system for randomness purposes, secondly, hiding the secret message is into a gray image for obtaining a stego-image. The hiding step is based on a proposed map that chooses from the last round of key expansion in the AES-192 algorithm. This map represented random positions of LSB in each byte of the gray image. The experimental result of this method proved a successful method based on metric criteria. Also, this method is the very speed for hiding ciphertext in the gray image as well as extracting ciphertext from the gray image. Also, it is very safe because it is difficult for attackers to distinguish between the original image and the stego image therefore the correlation between the original image and the stego- image is very close to 1.

Downloads

Download data is not yet available.

References

A. Bhatnagar, S. Chaku, and M. Sainger, “Hiding Compressed and Encrypted Data byusing a Technique of Steganography,” International Journal of Engineering Research & Technology (IJERT), vol. 09, no. 04, 2020.

J. Ashok, Y. Raju, S. Munishankaraiah, and K. Srinivas, “Steganography: An Overview,” International Journal of Engineering Science and Technology, vol. 2, no. 10, pp. 5985–5992, 2010.

Q. M. T. Ahvanooey and Li, “Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis,” vol. 2019, pp. 355 355.

N. Dalal, K. A. Hmood, M. S. Khudhia, and Altaei, “A New Steganographic Method for Embedded Image In Audio File,” International Journal of Computer Science and Security (IJCSS), no. 6, pp. 2012–2012.

“Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET 2019), IOP Conf. Series: Materials Science and Engineering, vol. 518, pp. 52003–52003, 2019.

A. R. Hamza, “Text-based Steganography using Huffman Compression and AES Encryption Algorithm,” Iraqi Journal of Science, vol. 62, no. 11, pp. 4110–4120, 2021.

N. Zainab, Sultani, N. Ban, and Dhannoon, “Image and audio steganography based on indirect LSB,” Kuwait J.Sci, vol. 48, no. 4, pp. 1 12, 2021

A. Gupta, D. Tiwari, V. Kumar, K. P. S. Rana, and S. Mirjalili, “A Chaos-Infused Moth-Flame Optimizer,” Arabian Journal for Science and

Engineering, 2022.

R. V. Soléa and Jordibascompteb, “Measuring chaos from spatial information,” Journal of Theoretical Biology, vol. 175, no. 2, pp. 139 147, 1995.

Z. Rahman, X. Yi, I. Khalil, and M. Sumi, “Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security,” 2022.

R. Huffaker, M. Bittelli, and R. Rosa, “Nonlinear Time Series Analysis with R,” 2018.

Q. V. Lawande, B. Ivan, and P. S, “Chaos Based Cryptography, ” A new approach To Secure Communication,” 2005.

H. L. Hussein, A. A. Abbass, A. Sinan, S. Naji, J. H. A.-A. A, and Lafa, “Hiding text in gray image using mapping technique,” “Article in Journal of Physics Conference Series, 2018.

A. K. F, R. Subhi, and Ali, “Hidden Encrypted Text Based On Secrete Map Equation And Bioinformatics Techniques,” Journal of Theoretical and Applied Information Technology, vol. 96, no. 1, 2019.

A. K. Farhan and N. M. G. Al-Saidi, “Abeer Tariq Maolood, Fahimeh Nazarimehr and Iqtadar Hussain “Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder,” Entropy, vol. 2019, no. 10, pp. 958–958.

C. J. R. Jayapandiyan, K. Kavitha, and Sakthivel, “Enhanced Least Significant Bit Replacement Algorithm in spatial domain of Steganography using character sequence optimization,” IEEE Access, 2020.

“An Optimized Steganography Hiding Capacity And Imperceptibly Using Genetic Algorithms,” IEEE Access, 2019.

M. Fateh, M. Rezvani, and Y. Iran, “A New Method of Coding for Steganography Based on LSB Matching Revisited,”Hindawi Security and Communication Networks,” 2021. 2021.

“Secure Image Steganography through Multilevel Security,” International Journal of Innovation, Creativity and Change, vol. 11, no. 1, 2020.

S. Dhawan and R. Gupta, “Analysis of various data security techniques of steganography: A survey,” Information Security Journal: A Global Perspective, vol. 30, pp. 2021–2021, 2020.

“Image Steganography Based On Odd/Even Pixels Distribution Scheme and Two Parameters Random Function”,” Journal of Theoretical and Applied Information Technology, vol. 95, pp. 22–22, 2017.

N. Manohar and P. V. Kumar, “Data Encryption & Decryption Using Steganography,” Proceedings of the International Conference on Intelligent Computing and Control Systems, vol. ISBN, pp. 978–979.

“Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document,” IEEE Access, vol. 8, pp. 27448–27458, 2020.

A. S. Nuha, Z. M. Alwan, and Hussain, “Compressive Sensing with Chaotic Sequences: An Application to Localization in Wireless Sensor Networks,” Wireless Personal Communications, 2019.

A. Kaiser, Reshak, N. Ban, Z. N. Dhannoon, and Sultani, “Explicit feedback based movie recommendation system: A survey,” AIP Conference Proceedings, vol. 2290, pp. 40009–40009, 2020.

A. Azhaar, A. K. Abdallah, and Farhan, “A New Image Encryption Algorithm Based on Multi ChaoticSystem,” Iraqi Journal of Science, vol. 63, no. 1, pp. 324–337, 2022.

Downloads

Published

2022-12-30

Issue

Section

Computer

How to Cite

[1]
Rusul Mansoor Al-Amri, Dalal N. Hamood, and Alaa Kadhim Farhan, “The Steganography Based On Chaotic System for Random LSB Positions: SBOCSFRLSBP”, WJCMS, vol. 1, no. 4, pp. 111–125, Dec. 2022, doi: 10.31185/wjcm.95.