- Sabry S. Nassar1,
- Nabil M. Ayad1,
- Hamdy M. Kelash2,
- Hala S. El-sayed3,
- Mohsen A. M. El-Bendary4,
- Fathi E. Abd El-Samie5 &
- …
- Osama S. Faragallah2,6
437Accesses
Abstract
The popularity of wireless multimedia applications in real life and the open nature of wireless media for access make the security of confidential multimedia over wireless channels a major task. This paper proposes a two multi-layer security algorithm using steganography with encryption that strengthens the image security through its transmission over a wireless channel. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The suitability of image as a cover medium is due to abundance of redundant bits, and bulk data capacity. The chaos based encryption algorithms are adopted in this paper. In this work a confidential image is embedded into a cover image using least significant bit steganography, and then the output stego image is encrypted using a 2-D Logistic map or 2-D chaotic Baker map. The encrypted stego image is then transmitted over a wireless AWGN channel and the reverse processes are implemented to extract the received secret image. Several experiments have been carried out to examine the suitability of the proposed algorithms for securing high sensitivity images through transmission over wireless channels at different noise levels.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.




























Similar content being viewed by others
References
Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. In IEEE-0-7803-9588-3/05/$20.00 ©2005.
Neeta, D., Wagh, K. K., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. In1st international conference on digital information management (pp. 173–178).
Juneja, M., & Sandhu, P. S. (2009). Designing of robust image steganography technique based on LSB insertion and encryption. InInternational conference on advances in recent technologies in communication and computing.
Chen, G. R., Mao, Y. B., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat map.Chaos, Solitons & Fractals,21, 749–761.
Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map.Image and Vision Computing,24, 926–934.
Arun, A. S., & Joseph, G. M. (2013). High security cryptographic technique using steganography and chaotic image encryption.IOSR Journal of Computer Engineering,12(5), 49–54.
Mehta, A. M., Lanzisera, S., & Pister, K. S. J. (2008). Steganography in 802.15.4 wireless communication. In2nd international symposium on advanced networks and telecommunication systems, ANTS.
Choudhary, K. (2012). Image steganography and global terrorism.Global Security Studies, 3(4), 115–135.
Kamal, A. H. M. (2013). Steganography: Securing message in wireless network.International Journal of Computers & Technology, 4(3), 797–801.
Owens, M. (2002).A discussion of covert channels and steganography. Bethesda, MD: SANS Institute.
Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen.Computer Journal,31(2), 26–34.
Chen M., Zhang, R., Niu, X., & Yang Y. (2006). Analysis of current steganography tools: Classifications & features. InInternational conference on intelligent information hiding and multimedia signal processing (IIH-MSP’06), IEEE-0-7695-2745-0/06 $20.00 © 2006.
Stuti, G., Rana, A., & Kaur, M. (2013). Comparison of image steganography techniques.International Journal of Computers and Distributed Systems, 3(I), 20–30.
Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map.Science Direct, Image and Vision Computing,24, 926–934.
Srividya, G., Nandakumar, P. (2011). A Triple-Key chaotic image encryption method. In2011 international conference on communications and signal processing (ICCSP) (pp. 266–270).
Ahmad, M., & Alam, M. S. (2009). A new algorithm of encryption and decryption of images using chaotic mapping.International Journal on Computer Science and Engineering, 2(1), 46–50.
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps.International Journal of Bifurcation and Chaos,8, 1259–1284.
El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations.EURASIP Journal on Audio, Speech, and Music Processing,2012, 4. doi:10.1186/1687-4722-2012-4.
Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM.Wireless Personal Communications,79(3), 2141–2154.
Silva, E. A., Panetta, K., Agaian, S. S. (2007). Quantifying image similarity using measure of enhancement by entropy. InSPIE proceedings Vol. 6579, mobile multimedia/image processing for military and security applications.
Author information
Authors and Affiliations
Nuclear Research Center, Atomic Energy Authority of Egypt, Cairo, Egypt
Sabry S. Nassar & Nabil M. Ayad
Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt
Hamdy M. Kelash & Osama S. Faragallah
Department of Electrical Engineering, Faculty of Engineering, Menoufia University, Shebin El-kom, 32511, Egypt
Hala S. El-sayed
Faculty of Industrial Education, Helwan University, Helwan, Egypt
Mohsen A. M. El-Bendary
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt
Fathi E. Abd El-Samie
Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, 21974, Saudi Arabia
Osama S. Faragallah
- Sabry S. Nassar
You can also search for this author inPubMed Google Scholar
- Nabil M. Ayad
You can also search for this author inPubMed Google Scholar
- Hamdy M. Kelash
You can also search for this author inPubMed Google Scholar
- Hala S. El-sayed
You can also search for this author inPubMed Google Scholar
- Mohsen A. M. El-Bendary
You can also search for this author inPubMed Google Scholar
- Fathi E. Abd El-Samie
You can also search for this author inPubMed Google Scholar
- Osama S. Faragallah
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toOsama S. Faragallah.
Rights and permissions
About this article
Cite this article
Nassar, S.S., Ayad, N.M., Kelash, H.M.et al. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering.Wireless Pers Commun91, 1023–1049 (2016). https://doi.org/10.1007/s11277-016-3387-5
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative