Robust image hiding in audio based on integer wavelet transform and Chaotic maps hopping

Author(s):  
Said E. El-Khamy ◽  
NohaO. Korany ◽  
Marwa H. El-Sherif
2014 ◽  
Vol 65 (2) ◽  
pp. 90-96 ◽  
Author(s):  
Xiaopeng Wei ◽  
Bin Wang ◽  
Qiang Zhang ◽  
Chao Che

Abstract In recent years, there has been growing interesting in image encryption based on chaotic maps and wavelet transform. In this paper, a novel scheme for image encryption based on chaotic maps and reversible integer wavelet transform is proposed. Firstly, the cipher key which is related to plain-image is used to generate different parameters and initial values of chaotic maps. Then the plain-image is permuted by the order from chaotic maps, and processed by integer wavelet transform. A part of transform coefficient is diffused by the orbits of chaotic maps. Finally, the cipher image is obtained by inverse integer wavelet transform based on the diffused coefficient. Numerical experimental results and comparing with previous works show that the proposed scheme possesses higher security than previous works, which is suitable for protecting the image information.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Bin Wang

In recent years, signal processing in the encrypted domain has attracted considerable research interest, especially embedding watermarking in encrypted image. In this work, a novel joint of image encryption and watermarking based on reversible integer wavelet transform is proposed. Firstly, the plain-image is encrypted by chaotic maps and reversible integer wavelet transform. Then the lossless watermarking is embedded in the encrypted image by reversible integer wavelet transform and histogram modification. Finally an encrypted image containing watermarking is obtained by the inverse integer wavelet transform. What is more, the original image and watermarking can be completely recovered by inverse process. Numerical experimental results and comparing with previous works show that the proposed scheme possesses higher security and embedding capacity than previous works. It is suitable for protecting the image information.


PLoS ONE ◽  
2017 ◽  
Vol 12 (5) ◽  
pp. e0176979 ◽  
Author(s):  
Nazeer Muhammad ◽  
Nargis Bibi ◽  
Zahid Mahmood ◽  
Tallha Akram ◽  
Syed Rameez Naqvi

Sign in / Sign up

Export Citation Format

Share Document