scholarly journals Subject Review: Information Hiding Using Chaotic Map

Author(s):  
Zahraa Salah Dhaief ◽  
RaniahAli Mustafa ◽  
Amal Abdulbaqi Maryoosh
2011 ◽  
Vol 225-226 ◽  
pp. 275-279
Author(s):  
Shuai Ren ◽  
Tao Zhang

Propose a new image processing method which named Color Field Structure (CFS). The direction of CFS represents the information. Take advantage of the feature that the energy of the image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub-image after first-order CARDBAL2 multi-wavelet transform. Propose an Information Hiding Algorithm based on modifying the direction of CFS in four CARDBAL2 first-order sub-images. The maximum change of direction angle is usually less than π/2k. The information is divided into two parts, one part is embedded in LL2 and HH2, and the other part is embedded in LH2 and HL2. Use the Logistic chaotic map, Knight's Tour traversal and the genetic algorithm to improve the consistence of the embedded data bits’ order and the character of the sub-image. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 28.64% and 23.06% averagely, and has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.


2014 ◽  
Vol 2014 (1) ◽  
pp. 34-42 ◽  
Author(s):  
N. S. Raghava ◽  
◽  
Ashish Kumar ◽  
Aishwarya Deep ◽  
Abhilasha Chahal ◽  
...  

2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Sign in / Sign up

Export Citation Format

Share Document