scholarly journals Design secure multi-level communication system based on duffing chaotic map and steganography

Author(s):  
Aliaa Sadoon Abd ◽  
Ehab Abdul Razzaq Hussein

Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies and hackers. They can be used separately or together. Encryption involves the basic principle of instantaneous conversion of valuable information into a specific form that unauthorized persons will not understand to decrypt it. While steganography is the science of embedding confidential data inside a cover, in a way that cannot be recognized or seen by the human eye. This paper presents a high-resolution chaotic approach applied to images that hide information. A more secure and reliable system is designed to properly include confidential data transmitted through transmission channels. This is done by working the use of encryption and steganography together. This work proposed a new method that achieves a very high level of hidden information based on non-uniform systems by generating a random index vector (RIV) for hidden data within least significant bit (LSB) image pixels. This method prevents the reduction of image quality. The simulation results also show that the peak signal to noise ratio (PSNR) is up to 74.87 dB and the mean square error (MSE) values is up to 0.0828, which sufficiently indicates the effectiveness of the proposed algorithm.

2019 ◽  
Vol 14 (2) ◽  
pp. 152-157 ◽  
Author(s):  
Majdi Al-qdah

Background: This paper presents an image security system by combining bit rotation with block based chaotic maps cryptography. Methods: The system uses permutation technique that divides the image into blocks before applying right/left rotation of bits to the pixel values based on a randomly generated key. Then, the image blocks are fused together. A scrambling operation followed by chaotic map is applied on the rotated image to diffuse the image pixels using another randomly generated key. The chaotic map scatters all the pixel positions in the image. The decryption is the complete reversal operation of the encryption process. Results & Conclusion: The performance of the proposed technique is evaluated using several metrics: Histograms of both original and cipher images, correlation of adjacent pixels and correlation between the original and cipher images, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR). The results indicate a very secure technique to protect all types of images.


2008 ◽  
Vol 18 (01) ◽  
pp. 251-261 ◽  
Author(s):  
SOHRAB BEHNIA ◽  
AFSHIN AKHSHANI ◽  
HADI MAHMODI ◽  
AMIR AKHAVAN

In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them have encountered many problems such as small key space and weak security. In the present paper, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps is proposed. These maps which are defined as ratios of polynomials of degree N, have interesting properties such as invariant measure, ergodicity, variable chaotic region with respect to the control parameters and ability to construct composition form of maps. We have used a composition of chaotic map to shuffle the position of image pixels. Another composition of chaotic map is used in diffusion process. According to the performed analysis, the introduced algorithm can satisfy the required performances such as high level security, large key space and the acceptable encryption speed.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 1222
Author(s):  
Rohith S ◽  
B K Sujatha

In this research work a novel idea of compressed, encrypted and encoded watermark embedding scheme for digital images is proposed. Initially watermark is compressed using Huffman encoder. Compressed watermark is encrypted using combined binary key sequence {Ki} derived from sequence of logistic map and Lozi map. The compressed and encrypted binary watermark is encoded using (n,1) repetition code. This compressed, encrypted and encoded binary watermark is embedded in alternate locations of cover image pixels using of Least Significant Bit (LSB) and Second Least Significant Bit (SLSB). To study the watermarked image quality, parameters such as Signal to Noise Ratio (SNR) and Mean Square Error (MSE) are used.  Also performance of the proposed system is compared with uncompressed, encrypted, encoded watermark embedding scheme. There is a significant improvement in MSE, SNR of watermarked image, when compressed watermark embedding scheme is compared to uncompressed watermark embedding scheme.  


2021 ◽  
pp. 3220-3227
Author(s):  
Sarab M. Hameed ◽  
Zuhair Hussein Ali ◽  
Ghadah K. AL-Khafaji ◽  
Safa Ahmed

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of the image band and pixel coordination is adopted, using the 3D map that produces irregular outputs for embedding a secret message randomly in the least significant bit (LSB) of the cover image. This increases the complexity encountered by the attackers. The performance of the proposed method was evaluated and the results reveal that the proposed method provides a high level of security through defeating various attacks, such as statistical attacks, with no detectable distortion in the stego-image. Comparison results ensure that the proposed method surpasses other existing steganographic methods regarding the Mean Square Error (MSE) and Peak Signal-to-Noise Ratio(PSNR).


2017 ◽  
Vol 63 (4) ◽  
pp. 417-422 ◽  
Author(s):  
Krasimir Kordov ◽  
Borislav Stoyanov

Abstract We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. On the first step a pseudorandom generator is constructed for chaotic pixel selection for hiding the secret message. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique.


2019 ◽  
Author(s):  
Danilo Carmona ◽  
Pablo Jaque ◽  
Esteban Vöhringer-Martinez

<div><div><div><p>Peroxides play a central role in many chemical and biological pro- cesses such as the Fenton reaction. The relevance of these compounds lies in the low stability of the O–O bond which upon dissociation results in radical species able to initiate various chemical or biological processes. In this work, a set of 64 DFT functional-basis set combinations has been validated in terms of their capability to describe bond dissociation energies (BDE) for the O–O bond in a database of 14 ROOH peroxides for which experimental values ofBDE are available. Moreover, the electronic contributions to the BDE were obtained for four of the peroxides and the anion H2O2− at the CBS limit at CCSD(T) level with Dunning’s basis sets up to triple–ζ quality provid- ing a reference value for the hydrogen peroxide anion as a model. Almost all the functionals considered here yielded mean absolute deviations around 5.0 kcal mol−1. The smallest values were observed for the ωB97 family and the Minnesota M11 functional with a marked basis set dependence. Despite the mean deviation, order relations among BDE experimental values of peroxides were also considered. The ωB97 family was able to reproduce the relations correctly whereas other functionals presented a marked dependence on the chemical nature of the R group. Interestingly, M11 functional did not show a very good agreement with the established order despite its good performance in the mean error. The obtained results support the use of similar validation strategies for proper prediction of BDE or other molecular properties by DF Tmethods in subsequent related studies.</p></div></div></div>


Author(s):  
V. Dodokhov ◽  
N. Pavlova ◽  
T. Rumyantseva ◽  
L. Kalashnikova

The article presents the genetic characteristic of the Chukchi reindeer breed. The object of the study was of the Chukchi reindeer. In recent years, the number of reindeer of the Chukchi breed has declined sharply. Reduced reindeer numbers could lead to biodiversity loss. The Chukchi breed of deer has good meat qualities, has high germination viability and is adapted in adverse tundra conditions of Yakutia. Herding of the Chukchi breed of deer in Yakutia are engaged only in the Nizhnekolymsky district. There are four generic communities and the largest of which is the agricultural production cooperative of nomadic tribal community «Turvaurgin», which was chosen to assess the genetic processes of breed using microsatellite markers: Rt6, BMS1788, Rt 30, Rt1, Rt9, FCB193, Rt7, BMS745, C 143, Rt24, OheQ, C217, C32, NVHRT16, T40, C276. It was found that microsatellite markers have a wide range of alleles and generally have a high informative value for identifying of genetic differences between animals and groups of animal. The number of identified alleles is one of the indicators of the genetic diversity of the population. The total number of detected alleles was 127. The Chukchi breed of deer is characterized by a high level of heterozygosity, and the random crossing system prevails over inbreeding in the population. On average, there were 7.9 alleles (Na) per locus, and the mean number of effective alleles (Ne) was 4.1. The index of fixation averaged 0.001. The polymorphism index (PIC) ranged from 0.217 to 0.946, with an average of 0.695.


2021 ◽  
Vol 80 (Suppl 1) ◽  
pp. 1119.1-1119
Author(s):  
L. Nacef ◽  
Y. Besbes ◽  
Y. Mabrouk ◽  
H. Ferjani ◽  
K. Maatallah ◽  
...  

Background:The lipid paradox is termed the decreased cholesterol level in rheumatoid arthritis (RA). Nevertheless, the apolipoprotein levels are usually higher than a healthy person and are predictors of cardiovascular events.Objectives:We aimed to describe lipid abnormalities in RA patients and to look for predictor factors of these changes.Methods:The prospective study was carried out on patients with RA who met the 2010 American College of Rheumatology (ACR)/European League Against Rheumatism (EULAR) classification criteria. These patients were followed in the rheumatology department of the Kassab Institute.We collected the socio-demographic data, biological and immunological parameters.The lipid assessment included: a measurement of total cholesterol (TC), HDL, LDL, and triglycerides (TG). Lipoproteins APOA1 and APOB were measured. All data were collected after patient consent.Results:Of the 47 patients recruited, 78.7% were female. The mean age was 52.5 ±11.06 [32-76]. The average RA progressed from 86.25 ±63 months [5-288] and was erosive in 81.6% of cases. The rheumatoid factor (RF) was positive in 57.8% of patients, and citrullinated antipeptide antibodies (ACPA) were present in 62.2%. Eight patients had a previous CV history.Mean TC was 4.42 ±1.3 [1.2-7.58], mean HDL was 1.38 ±0.73 [0.18-4.10], mean LDL was 2.55 ±1.16 [0.24-5.54]. The mean TG value was 1.28 ±0.6 [0.24-5.54]. TC elevation was found in 9.1% of cases, HDL in 21.3% of cases, LDL in 5.5% of cases, and TG in 16.4% of cases. Mean APOB/APOA1 ratio was 0.67 ±0.18 [0,46-1,11]. LDL elevation was associated to a high DAS28 (p=0.06, r=0.512). APOA1 was associated to a low DAS28 (p=0.04, r=-0.642).The mean value of APO A1 was 1.36 ±0.21 [0.84-1.81], that of APOB was 0.90 ±0.22 [0.58-1.40]. APOA1 values were lower in patients with high-level LDL (p=0.767). The APOB value was associated with lipid disturbance without significant correlation (p=0.291).Conclusion:Lipid test abnormalities can be found in RA patients outside of any known CV risk factors. APOA1 seems to have a protective effect. Screening and treatment of these abnormalities can prevent CV risk.References:[1]Miguel Bernardes and al. Coronary artery calcium score in female rheumatoid arthritis patients: Associations with apolipoproteins and disease biomarkers. Int J Rheum Dis. 2019;00:1–16.[2]Anna So dergren and al. Biomarkers associated with cardiovascular disease in patients with early rheumatoid arthritis. PLOS ONE. August 5, 2019.Disclosure of Interests:None declared


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Dennis Kupitz ◽  
Heiko Wissel ◽  
Jan Wuestemann ◽  
Stephanie Bluemel ◽  
Maciej Pech ◽  
...  

Abstract Background The introduction of hybrid SPECT/CT devices enables quantitative imaging in SPECT, providing a methodological setup for quantitation using SPECT tracers comparable to PET/CT. We evaluated a specific quantitative reconstruction algorithm for SPECT data using a 99mTc-filled NEMA phantom. Quantitative and qualitative image parameters were evaluated for different parametrizations of the acquisition and reconstruction protocol to identify an optimized quantitative protocol. Results The reconstructed activity concentration (ACrec) and the signal-to-noise ratio (SNR) of all examined protocols (n = 16) were significantly affected by the parametrization of the weighting factor k used in scatter correction, the total number of iterations and the sphere volume (all, p < 0.0001). The two examined SPECT acquisition protocols (with 60 or 120 projections) had a minor impact on the ACrec and no significant impact on the SNR. In comparison to the known AC, the use of default scatter correction (k = 0.47) or object-specific scatter correction (k = 0.18) resulted in an underestimation of ACrec in the largest sphere volume (26.5 ml) by − 13.9 kBq/ml (− 16.3%) and − 7.1 kBq/ml (− 8.4%), respectively. An increase in total iterations leads to an increase in estimated AC and a decrease in SNR. The mean difference between ACrec and known AC decreased with an increasing number of total iterations (e.g., for 20 iterations (2 iterations/10 subsets) = − 14.6 kBq/ml (− 17.1%), 240 iterations (24i/10s) = − 8.0 kBq/ml (− 9.4%), p < 0.0001). In parallel, the mean SNR decreased significantly from 2i/10s to 24i/10s by 76% (p < 0.0001). Conclusion Quantitative SPECT imaging is feasible with the used reconstruction algorithm and hybrid SPECT/CT, and its consistent implementation in diagnostics may provide perspectives for quantification in routine clinical practice (e.g., assessment of bone metabolism). When combining quantitative analysis and diagnostic imaging, we recommend using two different reconstruction protocols with task-specific optimized setups (quantitative vs. qualitative reconstruction). Furthermore, individual scatter correction significantly improves both quantitative and qualitative results.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


Sign in / Sign up

Export Citation Format

Share Document