Loading…

A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps

The fundamental objectives of a steganographic technique are to achieve both robustness and high-capacity for the hidden information. This paper proposes a steganographic algorithm that satisfies both of these objectives, based on enhanced chaotic maps. The algorithm consists of two phases. In the f...

Full description

Saved in:
Bibliographic Details
Published in:International journal of advanced computer science & applications 2023, Vol.14 (3)
Main Authors: Ramzan, Muhammad, Khan, Muhammad Fahad
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 3
container_start_page
container_title International journal of advanced computer science & applications
container_volume 14
creator Ramzan, Muhammad
Khan, Muhammad Fahad
description The fundamental objectives of a steganographic technique are to achieve both robustness and high-capacity for the hidden information. This paper proposes a steganographic algorithm that satisfies both of these objectives, based on enhanced chaotic maps. The algorithm consists of two phases. In the first phase, a cryptographic substitution box is constructed using a novel fusion technique based on logistic and sine maps. This technique overcomes existing vulnerabilities of chaotic maps, such as frail chaos, finite precision effects, dynamical degradation, and limited control parameters. In the second phase, a frequency-domain-based embedding scheme is used to transform the secret information into ciphertext by employing the substitution boxes. The statistical strength of the algorithm is assessed through several tests, including measures of homogeneity, correlation, mean squared error, information entropy, contrast, peak signal-to-noise ratio, energy, as well as evaluations of the algorithm's performance under JPEG compression and image degradation. The results of these tests demonstrate the algorithm's robustness against various attacks and provide evidence of its high-capacity for securely embedding secret information with good visual quality.
doi_str_mv 10.14569/IJACSA.2023.0140351
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2807222785</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2807222785</sourcerecordid><originalsourceid>FETCH-LOGICAL-c274t-a71447bf7dd9c35edc63d69d24772c74475fc781e370fe65b2841e3354c824a93</originalsourceid><addsrcrecordid>eNotkMtKw0AUhgdRsNS-gYsB16lzzSTLEKxWKoKt4EIYTiaTNqXNxJnpwrdvejmbc_v_w-FD6JGSKRUyzZ_n70W5LKaMMD4lVBAu6Q0aMSrTREpFbs91llCifu7RJIQtGYLnLM34CP0W-MtVhxDxMto1dG7tod-0Bhe7tfNt3OxxBcHW2HV40XYWPJ55MLF1HezwykMXGuf3cBpg6GpcbsDFwf8BfXhAdw3sgp1c8xh9z15W5Vuy-Hydl8UiMUyJmICiQqiqUXWdGy5tbVJep3nNhFLMqGEnG6MyarkijU1lxTIxNFwKkzEBOR-jp8vd3ru_gw1Rb93BDw8GzTKiGGMqk4NKXFTGuxC8bXTv2z34f02JPqPUF5T6hFJfUfIjeO1mhw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2807222785</pqid></control><display><type>article</type><title>A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps</title><source>Publicly Available Content Database</source><source>EZB Electronic Journals Library</source><creator>Ramzan, Muhammad ; Khan, Muhammad Fahad</creator><creatorcontrib>Ramzan, Muhammad ; Khan, Muhammad Fahad</creatorcontrib><description>The fundamental objectives of a steganographic technique are to achieve both robustness and high-capacity for the hidden information. This paper proposes a steganographic algorithm that satisfies both of these objectives, based on enhanced chaotic maps. The algorithm consists of two phases. In the first phase, a cryptographic substitution box is constructed using a novel fusion technique based on logistic and sine maps. This technique overcomes existing vulnerabilities of chaotic maps, such as frail chaos, finite precision effects, dynamical degradation, and limited control parameters. In the second phase, a frequency-domain-based embedding scheme is used to transform the secret information into ciphertext by employing the substitution boxes. The statistical strength of the algorithm is assessed through several tests, including measures of homogeneity, correlation, mean squared error, information entropy, contrast, peak signal-to-noise ratio, energy, as well as evaluations of the algorithm's performance under JPEG compression and image degradation. The results of these tests demonstrate the algorithm's robustness against various attacks and provide evidence of its high-capacity for securely embedding secret information with good visual quality.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2023.0140351</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Algorithms ; Chaos theory ; Cryptography ; Embedding ; Encryption ; Entropy (Information theory) ; Homogeneity ; Image compression ; Image degradation ; Robustness ; Signal to noise ratio ; Steganography ; Substitutes</subject><ispartof>International journal of advanced computer science &amp; applications, 2023, Vol.14 (3)</ispartof><rights>2023. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2807222785?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Ramzan, Muhammad</creatorcontrib><creatorcontrib>Khan, Muhammad Fahad</creatorcontrib><title>A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps</title><title>International journal of advanced computer science &amp; applications</title><description>The fundamental objectives of a steganographic technique are to achieve both robustness and high-capacity for the hidden information. This paper proposes a steganographic algorithm that satisfies both of these objectives, based on enhanced chaotic maps. The algorithm consists of two phases. In the first phase, a cryptographic substitution box is constructed using a novel fusion technique based on logistic and sine maps. This technique overcomes existing vulnerabilities of chaotic maps, such as frail chaos, finite precision effects, dynamical degradation, and limited control parameters. In the second phase, a frequency-domain-based embedding scheme is used to transform the secret information into ciphertext by employing the substitution boxes. The statistical strength of the algorithm is assessed through several tests, including measures of homogeneity, correlation, mean squared error, information entropy, contrast, peak signal-to-noise ratio, energy, as well as evaluations of the algorithm's performance under JPEG compression and image degradation. The results of these tests demonstrate the algorithm's robustness against various attacks and provide evidence of its high-capacity for securely embedding secret information with good visual quality.</description><subject>Algorithms</subject><subject>Chaos theory</subject><subject>Cryptography</subject><subject>Embedding</subject><subject>Encryption</subject><subject>Entropy (Information theory)</subject><subject>Homogeneity</subject><subject>Image compression</subject><subject>Image degradation</subject><subject>Robustness</subject><subject>Signal to noise ratio</subject><subject>Steganography</subject><subject>Substitutes</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotkMtKw0AUhgdRsNS-gYsB16lzzSTLEKxWKoKt4EIYTiaTNqXNxJnpwrdvejmbc_v_w-FD6JGSKRUyzZ_n70W5LKaMMD4lVBAu6Q0aMSrTREpFbs91llCifu7RJIQtGYLnLM34CP0W-MtVhxDxMto1dG7tod-0Bhe7tfNt3OxxBcHW2HV40XYWPJ55MLF1HezwykMXGuf3cBpg6GpcbsDFwf8BfXhAdw3sgp1c8xh9z15W5Vuy-Hydl8UiMUyJmICiQqiqUXWdGy5tbVJep3nNhFLMqGEnG6MyarkijU1lxTIxNFwKkzEBOR-jp8vd3ru_gw1Rb93BDw8GzTKiGGMqk4NKXFTGuxC8bXTv2z34f02JPqPUF5T6hFJfUfIjeO1mhw</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Ramzan, Muhammad</creator><creator>Khan, Muhammad Fahad</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2023</creationdate><title>A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps</title><author>Ramzan, Muhammad ; Khan, Muhammad Fahad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c274t-a71447bf7dd9c35edc63d69d24772c74475fc781e370fe65b2841e3354c824a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Chaos theory</topic><topic>Cryptography</topic><topic>Embedding</topic><topic>Encryption</topic><topic>Entropy (Information theory)</topic><topic>Homogeneity</topic><topic>Image compression</topic><topic>Image degradation</topic><topic>Robustness</topic><topic>Signal to noise ratio</topic><topic>Steganography</topic><topic>Substitutes</topic><toplevel>online_resources</toplevel><creatorcontrib>Ramzan, Muhammad</creatorcontrib><creatorcontrib>Khan, Muhammad Fahad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Research Library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science &amp; applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ramzan, Muhammad</au><au>Khan, Muhammad Fahad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps</atitle><jtitle>International journal of advanced computer science &amp; applications</jtitle><date>2023</date><risdate>2023</risdate><volume>14</volume><issue>3</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>The fundamental objectives of a steganographic technique are to achieve both robustness and high-capacity for the hidden information. This paper proposes a steganographic algorithm that satisfies both of these objectives, based on enhanced chaotic maps. The algorithm consists of two phases. In the first phase, a cryptographic substitution box is constructed using a novel fusion technique based on logistic and sine maps. This technique overcomes existing vulnerabilities of chaotic maps, such as frail chaos, finite precision effects, dynamical degradation, and limited control parameters. In the second phase, a frequency-domain-based embedding scheme is used to transform the secret information into ciphertext by employing the substitution boxes. The statistical strength of the algorithm is assessed through several tests, including measures of homogeneity, correlation, mean squared error, information entropy, contrast, peak signal-to-noise ratio, energy, as well as evaluations of the algorithm's performance under JPEG compression and image degradation. The results of these tests demonstrate the algorithm's robustness against various attacks and provide evidence of its high-capacity for securely embedding secret information with good visual quality.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2023.0140351</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2158-107X
ispartof International journal of advanced computer science & applications, 2023, Vol.14 (3)
issn 2158-107X
2156-5570
language eng
recordid cdi_proquest_journals_2807222785
source Publicly Available Content Database; EZB Electronic Journals Library
subjects Algorithms
Chaos theory
Cryptography
Embedding
Encryption
Entropy (Information theory)
Homogeneity
Image compression
Image degradation
Robustness
Signal to noise ratio
Steganography
Substitutes
title A Robust Steganographic Algorithm based on Linear Fractional Transformation and Chaotic Maps
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T17%3A47%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Robust%20Steganographic%20Algorithm%20based%20on%20Linear%20Fractional%20Transformation%20and%20Chaotic%20Maps&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Ramzan,%20Muhammad&rft.date=2023&rft.volume=14&rft.issue=3&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2023.0140351&rft_dat=%3Cproquest_cross%3E2807222785%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c274t-a71447bf7dd9c35edc63d69d24772c74475fc781e370fe65b2841e3354c824a93%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2807222785&rft_id=info:pmid/&rfr_iscdi=true