IJIGSP Vol. 4, No. 6, 8 Jul. 2012
Cover page and Table of Contents: PDF (size: 609KB)
Full Text (PDF, 609KB), PP.52-60
Views: 0 Downloads: 0
Chaotic encryption, Sensitivity, Ergodicity, 3D sawtooth maps, Image hiding
An image encryption scheme based on the 3D sawtooth map is proposed in this paper. The 3D sawtooth map is utilized to generate chaotic orbits to permute the pixel positions and to generate pseudo-random gray value sequences to change the pixel gray values. The image encryption scheme is then applied to encrypt the secret image which will be imbedded in one host image. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the stego-image looks visually identical to the original host one and the secret image can be effectively extracted upon image processing attacks, which demonstrates strong robustness against a variety of attacks.
Ruisong Ye,Wenping Yu,"An Image Hiding Scheme Using 3D Sawtooth Map and Discrete Wavelet Transform", IJIGSP, vol.4, no.6, pp.52-60, 2012. DOI: 10.5815/ijigsp.2012.06.08
[1]M.S. Baptista, “Cryptography with chaos”, Physics Letter A, 240, 1998, pp. 50-54.
[2]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding”, IBM Syst. J. 35 (3-4) , 1996, pp. 313-336.
[3]Fridrich J., Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, 8(1998), 1259–1284.
[4]Chen, G. R., Mao, Y. B., Chui, C. K., A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21: 749-761.
[5]Guan Z.-H., Huang F., Guan W., Chaos-based image encryption algorithm, Physics Letters A, 2005, 346: 153-157.
[6]Lian S., Sun J., Wang Z., A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons and Fractals, 2005, 26: 117-129.
[7]V. Patidar, N. K. Pareek, K. K. Sud, A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 14 (2009) 3056-3075.
[8]Zhang, G. J., Liu, Q., A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284: 2775-2780.
[9]Zhu Z. L., Zhang W., Wong K. W., Yu H., A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sci., 2010, 181: 1171-1186.
[10]Liu, H., Wang, X., Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Opt. Commun. 2011, 284: 3895-3903.
[11]T. Gao, Z. Chen, A new image encryption algorithm based on hyper-chaos, Physics Letters A, 372(2008), 394–400.
[12]Ye R., Li H., A novel digital image scrambling and watermarking scheme based on cellular automata, in: Proceedings of the 2008 International Symposium on Electronic Commerce and Security, pp. 938-941.
[13]Ye, R., A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, Opt. Commun. 2011, 284: 5290-5298.
[14]Ye, R., Zhou W., A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice, I. J. Computer Network and Information Security, 2012, 1: 38-44.
[15]Schneier, B., Cryptography: Theory and Practice, CRC Press, Boca Raton, 1995.
[16]Chan, C.K, Cheng, L.M., “Hiding data in images by simple LSB substitution”, Pattern Recognition, 2004, 37 (3): 469-474.
[17]Ahmidi, N., Safabakhsh, R., “A Novel DCT-based Approach for Secure Color Image Watermarking”, Proc. ITCC 2004 Int. Conf. Information Technology: Coding and Computing, 2004, 2: 709-713.
[18]Ming-Shing Hsieh, Din-Chang Tseng, and Yong-Huai Huang, “Hiding digital watermarks using multiresolution wavelet transform”, IEEE Trans. Industrial Electronics, 48, 2001, pp. 875-882.
[19]R. Clark Robinson, An Introduction to Dynamical Systems, Continuous and Discrete, Prentice Hall, 2004.Tan Zhiming. Research on Graph Theory Based Image Segmentation and Its Embedded Application Shanghai: Dissertation of Shanghai Jiao Tong University, 2007, 14-24.
[20]Shannon C. E., Communication theory of secrecy system. Bell Syst. Tech. J, 1949, 28: 656–715.