An Efficient Wavelet Transform Based Steganography Technique Using Chaotic Map

R. Latha, R. Premkumar, S. Anand
{"title":"An Efficient Wavelet Transform Based Steganography Technique Using Chaotic Map","authors":"R. Latha, R. Premkumar, S. Anand","doi":"10.1109/ICCTCT.2018.8551076","DOIUrl":null,"url":null,"abstract":"Cryptography and steganography unit to ancient techniques for secret communication. Knowledge protection is presently an enormous cringe and good answer to the current disadvantage is cryptography and steganography. Throughout this planned work a system is developed throughout that riffle work primarily based Steganography degreed Cryptography victimization chaotic map is combined on to provide high security to the message throughout communication in associate degree unsecure channel. In WT primarily based Steganography taking advantage of the suggests that the human eye perceives photos, the technique involves of substitution the chaos bits of each constituent of a instrumentality image with the knowledge of a hidden message. Cryptography supported chaotic network is used as a result of its noise like behavior that's quite necessary for decipherer to grasp relating to the hidden knowledge as a results of its durable to predict. That the knowledge is being unbroken secret. Throughout this work we've thought-about the advantages of every the ideas associated developed a model throughout that originally a message is embedded in an particularly RGB image victimization riffle steganography that the stego image is encrypted victimization chaotic neural network to provide high security to the message. The simulation results shows that offer hardiness of the technique.","PeriodicalId":344188,"journal":{"name":"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTCT.2018.8551076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Cryptography and steganography unit to ancient techniques for secret communication. Knowledge protection is presently an enormous cringe and good answer to the current disadvantage is cryptography and steganography. Throughout this planned work a system is developed throughout that riffle work primarily based Steganography degreed Cryptography victimization chaotic map is combined on to provide high security to the message throughout communication in associate degree unsecure channel. In WT primarily based Steganography taking advantage of the suggests that the human eye perceives photos, the technique involves of substitution the chaos bits of each constituent of a instrumentality image with the knowledge of a hidden message. Cryptography supported chaotic network is used as a result of its noise like behavior that's quite necessary for decipherer to grasp relating to the hidden knowledge as a results of its durable to predict. That the knowledge is being unbroken secret. Throughout this work we've thought-about the advantages of every the ideas associated developed a model throughout that originally a message is embedded in an particularly RGB image victimization riffle steganography that the stego image is encrypted victimization chaotic neural network to provide high security to the message. The simulation results shows that offer hardiness of the technique.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于小波变换的混沌映射隐写技术
密码学和隐写术以古代秘密通信技术为单位。知识保护目前是一个巨大的问题,而加密和隐写术是解决目前缺点的好办法。在整个计划的工作中,开发了一个系统,该系统主要基于隐写术、密码学、受害混沌映射相结合,在副学位不安全信道中为整个通信过程中的消息提供高安全性。在基于小波变换的隐写术中,利用人眼感知照片的提示,该技术涉及到用隐藏信息的知识替换工具性图像的每个组成部分的混沌位。支持密码学的混沌网络由于其类噪声行为而被使用,由于其持久的预测能力,解码器必须掌握与隐藏知识相关的信息。这个知识是不被打破的秘密。在整个工作中,我们思考了每一个相关思想的优势,并开发了一个模型,整个模型最初是一个信息嵌入在一个特别的RGB图像受害步枪隐写术中,隐写图像是加密受害混沌神经网络,为信息提供高安全性。仿真结果表明,该技术具有良好的耐受性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Memristor-CMOS Analog Co-Processor for Acceleration of High Performance Computing Applications Electronic Device Games: An Implication on Academic Performance of Students in CST An Optimised BCD Digit Multiplier A Study on Transaction Specification based Software Testing for Internet of Things Comparative Study of Short-Term Wind Speed Forecasting Techniques Using Artificial Neural Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1