Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The popularity of wireless multimedia applications in real life and the open nature of wireless media for access make the security of confidential multimedia over wireless channels a major task. This paper proposes a two multi-layer security algorithm using steganography with encryption that strengthens the image security through its transmission over a wireless channel. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The suitability of image as a cover medium is due to abundance of redundant bits, and bulk data capacity. The chaos based encryption algorithms are adopted in this paper. In this work a confidential image is embedded into a cover image using least significant bit steganography, and then the output stego image is encrypted using a 2-D Logistic map or 2-D chaotic Baker map. The encrypted stego image is then transmitted over a wireless AWGN channel and the reverse processes are implemented to extract the received secret image. Several experiments have been carried out to examine the suitability of the proposed algorithms for securing high sensitivity images through transmission over wireless channels at different noise levels.

This is a preview of subscription content,log in via an institution to check access.

Access this article

Log in via an institution

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

References

  1. Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. In IEEE-0-7803-9588-3/05/$20.00 ©2005.

  2. Neeta, D., Wagh, K. K., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. In1st international conference on digital information management (pp. 173–178).

  3. Juneja, M., & Sandhu, P. S. (2009). Designing of robust image steganography technique based on LSB insertion and encryption. InInternational conference on advances in recent technologies in communication and computing.

  4. Chen, G. R., Mao, Y. B., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat map.Chaos, Solitons & Fractals,21, 749–761.

    Article MathSciNet MATH  Google Scholar 

  5. Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map.Image and Vision Computing,24, 926–934.

    Article  Google Scholar 

  6. Arun, A. S., & Joseph, G. M. (2013). High security cryptographic technique using steganography and chaotic image encryption.IOSR Journal of Computer Engineering,12(5), 49–54.

    Article  Google Scholar 

  7. Mehta, A. M., Lanzisera, S., & Pister, K. S. J. (2008). Steganography in 802.15.4 wireless communication. In2nd international symposium on advanced networks and telecommunication systems, ANTS.

  8. Choudhary, K. (2012). Image steganography and global terrorism.Global Security Studies, 3(4), 115–135.

    Google Scholar 

  9. Kamal, A. H. M. (2013). Steganography: Securing message in wireless network.International Journal of Computers & Technology, 4(3), 797–801.

    Google Scholar 

  10. Owens, M. (2002).A discussion of covert channels and steganography. Bethesda, MD: SANS Institute.

    Google Scholar 

  11. Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen.Computer Journal,31(2), 26–34.

    Article  Google Scholar 

  12. Chen M., Zhang, R., Niu, X., & Yang Y. (2006). Analysis of current steganography tools: Classifications & features. InInternational conference on intelligent information hiding and multimedia signal processing (IIH-MSP’06), IEEE-0-7695-2745-0/06 $20.00 © 2006.

  13. Stuti, G., Rana, A., & Kaur, M. (2013). Comparison of image steganography techniques.International Journal of Computers and Distributed Systems, 3(I), 20–30.

    Google Scholar 

  14. Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map.Science Direct, Image and Vision Computing,24, 926–934.

    Article  Google Scholar 

  15. Srividya, G., Nandakumar, P. (2011). A Triple-Key chaotic image encryption method. In2011 international conference on communications and signal processing (ICCSP) (pp. 266–270).

  16. Ahmad, M., & Alam, M. S. (2009). A new algorithm of encryption and decryption of images using chaotic mapping.International Journal on Computer Science and Engineering, 2(1), 46–50.

    Google Scholar 

  17. Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps.International Journal of Bifurcation and Chaos,8, 1259–1284.

    Article MathSciNet MATH  Google Scholar 

  18. El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations.EURASIP Journal on Audio, Speech, and Music Processing,2012, 4. doi:10.1186/1687-4722-2012-4.

    Article  Google Scholar 

  19. Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM.Wireless Personal Communications,79(3), 2141–2154.

    Article  Google Scholar 

  20. Silva, E. A., Panetta, K., Agaian, S. S. (2007). Quantifying image similarity using measure of enhancement by entropy. InSPIE proceedings Vol. 6579, mobile multimedia/image processing for military and security applications.

Download references

Author information

Authors and Affiliations

  1. Nuclear Research Center, Atomic Energy Authority of Egypt, Cairo, Egypt

    Sabry S. Nassar & Nabil M. Ayad

  2. Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

    Hamdy M. Kelash & Osama S. Faragallah

  3. Department of Electrical Engineering, Faculty of Engineering, Menoufia University, Shebin El-kom, 32511, Egypt

    Hala S. El-sayed

  4. Faculty of Industrial Education, Helwan University, Helwan, Egypt

    Mohsen A. M. El-Bendary

  5. Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

    Fathi E. Abd El-Samie

  6. Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, 21974, Saudi Arabia

    Osama S. Faragallah

Authors
  1. Sabry S. Nassar

    You can also search for this author inPubMed Google Scholar

  2. Nabil M. Ayad

    You can also search for this author inPubMed Google Scholar

  3. Hamdy M. Kelash

    You can also search for this author inPubMed Google Scholar

  4. Hala S. El-sayed

    You can also search for this author inPubMed Google Scholar

  5. Mohsen A. M. El-Bendary

    You can also search for this author inPubMed Google Scholar

  6. Fathi E. Abd El-Samie

    You can also search for this author inPubMed Google Scholar

  7. Osama S. Faragallah

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toOsama S. Faragallah.

Rights and permissions

About this article

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Advertisement


[8]ページ先頭

©2009-2025 Movatter.jp