The secret data is encrypted and permutated using the chaos method. Experiments show the good quality of the stego-image and resistant against the various noise attacks (Like Salt and Pepper). At the same time, the proposed algorithm exhibits good encryption speed, less computations and excellent security performance.
In the present era of fast communication, one needs to protect communicated information (message or plain text) from an unauthorized user. The private-key and the public-key are the two well-known cryptosystems [1, 2, 3, 4, 5, 6, and 7] and using these one can keep the secret data securely in such a way that the invader cannot understand what the secret data means.
Keywords: Steganography, Cryptography, Permutation function, and Error correction and detection code.
[...] In the future work, we are planning to design a sophisticated hardware based on this technique which will be targeted to use in highly secure multimedia data transmission applications 6. REFERENCES B.Gladman, “Implementation experience with the AES candidate algorithms,” Proc. of 2nd AES candidate conference, March 22- Rome, pp. 7-14. (http://fp.gladman.plus.com/cryptography\_technol ogy/rijndael) 2. Courtois, N.T. and J. Pieprzyk, “Cryptanalysis of Block Ciphers with Overdefined Systems of Equations,” Asiacrypt 2002, LNCS 2501,SpringerVerlag, pp 267-287. (http://eprint.iacr.org/2002/044/) 3. J.Daemen and V.Rijmen, block cipher Rijndael,” available from NIST's AES homepage, (http://www.nist.gov/aes) 4. [...]
[...] Saroagi, Investigation into the use of Linear Feedback Shift Register for Data Encrypting and Data Hiding in the field of Steganography,” Conference on esecurity, Cyber Crime & Law, pp., Chandigarh, India, February 2004. R. Brown, L. O. Chua, “Clarifying chaos: Examples and counterexamples” , Int. J. Bifurcation and Chaos 6 (1996) 219–249. J. Fridrich, “Symmetric ciphers based on twodimensional chaotic Int. J. Bifurcation and Chaos 8 (1998) pp 1259– N. Bourbakis, C. Alexopoulos, “Picture data encryption using SCAN pattern”, Pattern Recogn (1992) pp J. [...]
[...] DEPLOY ROBUST DATA TRANSMISSION OVER THE NOISY CHANNEL ABSTRACT: An enhanced secret and robust data transmission over the noisy channel [33]. The secret data is encrypted and permutated using the chaos method, further encoded the data using the error detection and correction code. Experiments show the good quality of the stego-image and resistant against the various noise attacks (Like Salt and Pepper). At the same time, the proposed algorithm exhibits good encryption speed and less computations, and excellent security performance. [...]
[...] Morimoto, A.Lu, “Techniques for data hiding. IBM systems Journal, Vol no. p313-336 N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE computer, Vol No February 1998,pp. 26-34. R. J. Anderson and F.A.P. petitcolas, the Limits of steganography,” IEEE Journal on Selected Areas in Communications, vol. 16,No.4, May 1998 N. Nikolaidis,I. Pitas:,”Robust image watermarking in the spatial domain,” Signal Process,66 (1998),385-403. O. Bruyndonckx, J. J. Quisquater, B. Macq, “Spatial method for copyright labeling of digital images,” Proceeding of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 20-22 June 1995, pp. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee