High secure digital image steganography based on 3D chaotic map

Author(s):  
Milad Yousefi Valandar ◽  
Peyman Ayubi ◽  
Milad Jafari Barani
2014 ◽  
Vol 2014 (1) ◽  
pp. 34-42 ◽  
Author(s):  
N. S. Raghava ◽  
◽  
Ashish Kumar ◽  
Aishwarya Deep ◽  
Abhilasha Chahal ◽  
...  

Author(s):  
M. Hassaballah ◽  
Mohamed Abdel Hameed ◽  
Monagi H. Alkinani

Author(s):  
Anukul Pandey ◽  
Barjinder Singh Saini ◽  
Butta Singh ◽  
Neetu Sood

Signal processing technology comprehends fundamental theory and implementations for processing data. The processed data is stored in different formats. The mechanism of electrocardiogram (ECG) steganography hides the secret information in the spatial or transformed domain. Patient information is embedded into the ECG signal without sacrificing the significant ECG signal quality. The chapter contributes to ECG steganography by investigating the Bernoulli's chaotic map for 2D ECG image steganography. The methodology adopted is 1) convert ECG signal into the 2D cover image, 2) the cover image is loaded to steganography encoder, and 3) secret key is shared with the steganography decoder. The proposed ECG steganography technique stores 1.5KB data inside ECG signal of 60 seconds at 360 samples/s, with percentage root mean square difference of less than 1%. This advanced 2D ECG steganography finds applications in real-world use which includes telemedicine or telecardiology.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document