A steganographic approach based on the chaotic fractional map and in the DCT domain

08/28/2019
by   A. Soria-Lorente, et al.
0

A steganographic method based on the chaotic fractional map and in the DCT domain is proposed. This method embeds a secret message in some high frequency coefficients of the image using a 128-bit private key and a chaotic fractional map which generate a permutation indicating the positions where the secret bits will be embedded. An experimental work on the validation of the proposed method is also presented, showing performance in imperceptibility, quality, similarity and security analysis of the steganographic system. The proposed algorithm improved the level of imperceptibility and Cachin's security of stego-system analyzed through the values of Peak Signal-to-Noise Ratio (PSNR) and the Relative Entropy (RE).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2019

Hiding data inside images using orthogonal moments

In this contribution we propose a novel steganographic method based on s...
research
12/31/2014

HSI based colour image equalization using iterative nth root and nth power

In this paper an equalization technique for colour images is introduced....
research
01/12/2010

A New Image Steganography Based On First Component Alteration Technique

In this paper, A new image steganography scheme is proposed which is a k...
research
09/15/2016

FPGA Implementation of a Novel Image Steganography for Hiding Images

As the complexity of current data flow systems and according infrastruct...
research
03/30/2018

A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation

In this paper, a robust and blind watermarking method is proposed, which...
research
09/21/2021

A Low Complexity MAP Detector for OTFS Modulation in Logarithmic Domain

Orthogonal time-frequency space (OTFS) has been confirmed to take advant...
research
12/25/2018

Usage of analytic hierarchy process for steganographic inserts detection in images

This article presents the method of steganography detection, which is fo...

Please sign up or login with your details

Forgot password? Click here to reset