Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System

Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System

Shun Zhang, Liang Yang, Xihao Xu, Tiegang Gao
Copyright: © 2018 |Pages: 14
DOI: 10.4018/IJDCF.2018010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security always plays an important role in the communication. Steganography, which conceals the process of communication, is another efficient way to achieve secure communication besides encryption. This paper proposes a secure steganography scheme in JPEG images with high embedding capacity and low distortion to the cover image. It embeds the additional information by modifying the DCT coefficients in JPEG images. Considering the size of the additional information, some DCT coefficients are adaptively selected in the embedding process. Two chaotic encryption strategies are designed based on the hyper-chaotic system to encrypt the additional information before the embedding to enhance the security. Extensive experiments have demonstrated the validity and efficiency of this proposed scheme. Compared with some existing schemes, it offers larger embedding rate and lower distortion with stronger security.
Article Preview
Top

1. Introduction

The security in communication is important. Especially in the modern times, more and more information has been transmitted on the Internet. However, the Internet is insecure due to its original design in the transfer protocols. Therefore, it is of vital importance to guarantee the safety of private and secret information in the Internet Era. Various methods have been proposed ever since ancient times to ensure the secure communication. Encryption and steganography are two of the most important strategies, generally. The encryption strategy makes original information meaningless, which may arouse invaders’ attention. Therefore, it is easier detected and even, decrypted. The steganography (Marvel, Boncelet & Retter, 1999) strategy hides the secure information into a cover media, while only the intended receiver is aware of the existence of the hidden information. Therefore, nobody perceives the invisible information, and without the keys, nobody can extract this information. It offers better invisibility and security.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing