Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Multi-level Security Technique Using Steganography with Chaotic Encryption


Affiliations
1 Nuclear Research Center, Atomic Energy Authority, Inshas, P. O. Box-13759, Egypt
2 Nuclear Research Center, Atomic Energy Authority, Inshas, P. O. Box 13759, Egypt
3 Menoufia University, Menouf, Egypt
4 Helwan University, Egypt
     

   Subscribe/Renew Journal


This paper proposes two novel multi-layer security techniques that exploit the advantages of two important security techniques–steganography and image encryption. Image steganography technique presents an important task for the data transmission; it provides transferring the embedded information to the destination without being detected by concealing the existence of hidden secret data inside a cover image. Unlike the text, images have different characteristics such as bulk data capacity and high data redundancy, so the encryption of images is different from that used with texts. This paper presents two powerful encrypted steganogrophic techniques using the chaotic encryption. The chaos based cryptographic algorithms are considered an efficient and secured image encryption technique. In this work, the steganography firstly, is used with 2D Logistic map and secondly used with Chaotic Baker map as two proposed multi-layer security techniques. Once the secret image is embedded in a cover image using Least Significant Bit (LSB) based Steganography it is encrypted using 2D Logistic map or Chaotic Baker map to produce a higher security algorithm. Different image analyses were verified and the results of the algorithms prove that, the proposed techniques can be implemented practically and efficiently to protect a high sensitive and secure data such as nuclear and military information.


Keywords

Steganography, Image Encryption, LSB Replacement, 2D Logistic Map, Chaotic Baker Map.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 215

PDF Views: 3




  • Multi-level Security Technique Using Steganography with Chaotic Encryption

Abstract Views: 215  |  PDF Views: 3

Authors

S. S. Nassar
Nuclear Research Center, Atomic Energy Authority, Inshas, P. O. Box-13759, Egypt
N. M. Ayad
Nuclear Research Center, Atomic Energy Authority, Inshas, P. O. Box 13759, Egypt
H. M. Kollash
Menoufia University, Menouf, Egypt
O. S. Faragallah
Menoufia University, Menouf, Egypt
M. A. M. El-Bendary
Helwan University, Egypt
F. E. Abd-Elsamie
Menoufia University, Menouf, Egypt

Abstract


This paper proposes two novel multi-layer security techniques that exploit the advantages of two important security techniques–steganography and image encryption. Image steganography technique presents an important task for the data transmission; it provides transferring the embedded information to the destination without being detected by concealing the existence of hidden secret data inside a cover image. Unlike the text, images have different characteristics such as bulk data capacity and high data redundancy, so the encryption of images is different from that used with texts. This paper presents two powerful encrypted steganogrophic techniques using the chaotic encryption. The chaos based cryptographic algorithms are considered an efficient and secured image encryption technique. In this work, the steganography firstly, is used with 2D Logistic map and secondly used with Chaotic Baker map as two proposed multi-layer security techniques. Once the secret image is embedded in a cover image using Least Significant Bit (LSB) based Steganography it is encrypted using 2D Logistic map or Chaotic Baker map to produce a higher security algorithm. Different image analyses were verified and the results of the algorithms prove that, the proposed techniques can be implemented practically and efficiently to protect a high sensitive and secure data such as nuclear and military information.


Keywords


Steganography, Image Encryption, LSB Replacement, 2D Logistic Map, Chaotic Baker Map.