Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System

Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System

Shun Zhang (College of Software, Nankai University, Tianjin, China), Liang Yang (College of Software, Nankai University, Tianjin, China), Xihao Xu (College of Software, Nankai University, Tianjin, China) and Tiegang Gao (College of Software, Nankai University, Tianjin, China)
Copyright: © 2018 |Pages: 14
DOI: 10.4018/IJDCF.2018010104

Abstract

Security always plays an important role in the communication. Steganography, which conceals the process of communication, is another efficient way to achieve secure communication besides encryption. This paper proposes a secure steganography scheme in JPEG images with high embedding capacity and low distortion to the cover image. It embeds the additional information by modifying the DCT coefficients in JPEG images. Considering the size of the additional information, some DCT coefficients are adaptively selected in the embedding process. Two chaotic encryption strategies are designed based on the hyper-chaotic system to encrypt the additional information before the embedding to enhance the security. Extensive experiments have demonstrated the validity and efficiency of this proposed scheme. Compared with some existing schemes, it offers larger embedding rate and lower distortion with stronger security.
Article Preview

1. Introduction

The security in communication is important. Especially in the modern times, more and more information has been transmitted on the Internet. However, the Internet is insecure due to its original design in the transfer protocols. Therefore, it is of vital importance to guarantee the safety of private and secret information in the Internet Era. Various methods have been proposed ever since ancient times to ensure the secure communication. Encryption and steganography are two of the most important strategies, generally. The encryption strategy makes original information meaningless, which may arouse invaders’ attention. Therefore, it is easier detected and even, decrypted. The steganography (Marvel, Boncelet & Retter, 1999) strategy hides the secure information into a cover media, while only the intended receiver is aware of the existence of the hidden information. Therefore, nobody perceives the invisible information, and without the keys, nobody can extract this information. It offers better invisibility and security.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2019): Forthcoming, Available for Pre-Order
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing