Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/9672
Title: Image Steganography Technique based on Lorenz Chaotic System and Bloom Filter
Authors: Ahmad Salim, Khitam Abdulbasit Mohammed
Farah Maath Jasem, Ali Makki Sagheer
Keywords: Information security
Lorenz system
Bloom filter
Steganography
Image encryption
Chaotic system
Issue Date: 10-Aug-2024
Citation: 3
Abstract: Steganography is the study of invisible communication, which typically focuses on methods of concealing the existence of the communicated message. Steganography is now widely used as a means of protecting sensitive data. The term ”security” in steganography systems mainly implies to the idea of ”undetectability”, that is, how effective the steganographic method for hiding data in terms of its capability to avoid detection through statistical analysis and remain undiscovered even if the cover media is found by an unauthorized party. There are many techniques used in steganography systems, one of which and the most common is the Least Significant Bit (LSB) technique. In this approach, some of the right-most bits of the cover image is replaced with the data to be hidden. Due to the computations simlicity of this approach, it is extremely susceptible to statistical attacks which remains a challenge. The proposed technique in this study utilizes chaotic systems to generate pseudo-random image positions for concealing sensitive data within cover images. By leveraging Lorenz’s chaotic system and the Bloom filter, the method aims to enhance information security by preventing data repetition and loss in the same pixel. The approach overcomes the vulnerabilities of traditional LSB techniques by embedding encrypted data in arbitrary locations, making it more secure against steganalysis. Results demonstrate the method’s effectiveness against visual and analytical attacks, with a PSNR of 48.57% and a NPCR of 32.35%. This innovative approach offers a robust solution for securely embedding data within images, contributing to the advancement of information security in digital systems.
URI: http://localhost:8080/xmlui/handle/123456789/9672
ISSN: 2210-142X
Appears in Collections:قسم نظم المعلومات

Files in This Item:
File Description SizeFormat 
IJCDS160161_1570901629.pdf1.55 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.