A New Approach for Chaotic Encrypted Data Hiding in Color Image

Talee, Ghada TH.; Jelmeran, Melad J.; Mohammed, Saja J.
January 2014
International Journal of Computer Applications;Jan2014, Vol. 86, p23
Academic Journal
Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts and revealing the original messages. In digital world, Steganography is introduced to hide the existence of the communication by concealing encryption message inside color image. This paper proposed a steganography algorithm that hides encrypted text in color image by using chaotic hybrid approach. First, the text will be encrypted by one of substitution encrypted methods then, the result will be hidden in a color image by using the chaotic equation (which is also used to create cipher text). Then, measurements PSNR, MSE and NC are used to calculate the effectiveness of the proposed method is described pictorially and also has been shown that a multi-level of security of data can be achieved.


Related Articles

  • Chaotic Encryption Technique for Color Images by Coupling Two Chaotic Maps. Asmita; Lade, Shrikant // International Journal of Computer Science & Network Security;Oct2014, Vol. 14 Issue 10, p90 

    With the increasing demand of providing security for images/videos with private information, chaos-based cryptosystems have played an important role in image encryption because of their excellent random properties and encryption performance. However, existing chaos-based systems have the...

  • A chaotic block encryption algorithm. WEI Feng // Journal of Zhengzhou University of Light Industry, Natural Scien;Dec2014, Vol. 29 Issue 6, p73 

    Aiming at the security problem of chaos theory in cryptography application, a chaotic block encryption algorithm was designed based on the theory of discrete coupled map lattice and asymptotic deterministic randomness. The algorithm used aymptotic deterministic randomness key to diffuse the...

  • A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes. Madhavi, D.; Vasu Devasastry, A. // International Journal of Computer Applications;Jan2014, Vol. 86, p27 

    VC, EVCS and Color EVCS are the three techniques used for Visual Cryptography Schemes. Visual Cryptography Scheme (VCS) is one of the techniques used to encrypt the image by dividing the original image into transparencies called Shares. A set of qualified participants is able to recover the...

  • A new color image encryption scheme based on chaos. Huaixun Zhao; Peng Cheng; JunHao Han // Applied Mechanics & Materials;2014, Issue 602-605, p3498 

    This letter presents a new color image encryption scheme based on the coupled chaos maps. First, the algorithm uses the coupled logistic map to generate random strong key stream, and then designed a kind of initial simple diffusion-joint scrambling-combined diffusion method from the point of the...

  • A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security. Abu Zaid, Osama M.; El-Fishawy, Nawal A.; Nigm, E. M.; Faragallah, Osama S. // International Journal of Computer Applications;Jan2013, Vol. 61, Special section p29 

    In this paper, a proposed encryption scheme based on Henon chaotic system (PESH) is presented in order to meet the requirements of secure image transfer. Scheme based on Henon chaotic system by Chen Wei-bin et al., will be designated here as (SHCH). SHCH and a proposed encryption scheme (PESH)...

  • Application of Compound Chaotic Mapping in Voice Encryption Algorithm. Ruishan Du. Yang Li // International Journal of Computer Science & Network Security;Aug2014, Vol. 14 Issue 8, p44 

    Using the Devaney chaos theory, designed a compound chaotic mapping as the encryption function, and had proven that the track was non-periodic for the initial value of a finite decimal. We have designed an encryption algorithm successively according to this, and realized the encryption for sound...

  • A novel biological image encryption algorithm based on two-dimensional Feigenbaum chaotic map. Li Tu; Yingzheng Zhang; Xuehua Huang; Liyuan Jia // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 7, p2073 

    This paper proposes a nonlinear coupled two-dimensional generalized Feigenbaum chaotic mapping, by using bifurcation graphics, we studied the complex nonlinear dynamic activities of two-dimensional formula. By using the coupled two-dimensional generalized Feigenbaum chaotic mapping a chaotic...

  • Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E. Jaffar, Amar; Martinez, Christopher J. // International Journal of Computer & Electrical Engineering;Aug2013, Vol. 5 Issue 4, p410 

    The United States National Institute of Standards and Technology (NIST) created an open competition to find a new standard for cryptographic hashing in 2007. The competition was composed of a number of rounds that ended with 5 finalists (BLAKE, Grostl, JH, Keccak, Skein) in December of 2010....

  • Research on General Permutation Encryption Module based on Chaos Theory. Wenjie Sun // Applied Mechanics & Materials;2014, Issue 686, p381 

    Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics