Enhancing LSB embedding schemes using chaotic maps systems

  • PDF / 2,782,438 Bytes
  • 19 Pages / 595.276 x 790.866 pts Page_size
  • 83 Downloads / 219 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789().,-volV)

IAPR-MEDPRAI

Enhancing LSB embedding schemes using chaotic maps systems Lakhdar Laimeche1 • Abdallah Meraoumia1 • Hakim Bendjenna1 Received: 3 November 2018 / Accepted: 5 October 2019  Springer-Verlag London Ltd., part of Springer Nature 2019

Abstract In our modern life, persons and institutions alike are rapidly embracing the shift toward communication via the Internet. As these entities adopt a faster and efficient communication protocol, information security techniques such as steganography and cryptography become powerful and necessary tools for conducting secure and secrecy communications. Currently, several steganography techniques have been developed, and the least significant bit (LSB) is one of these techniques which is a popular type of steganographic algorithms in the spatial domain. Indeed, as any other existing techniques, the selection of positions for data embedding within a cover signal mainly depends on a pseudorandom number generator without considering the relationship between the LSBs of the cover signal and the embedded data. In this paper and for best pixels’ positions adjustment, in which the visual distortion of the stego-image, as well as the embedding changes, becomes optimum, we propose two new position selection scenarios of LSBs-based steganography. Our new works are to improve the embedding efficiency, that is to say, select the suitable cover image pixels’ values that optimize the expected number of modifications per pixel and the visual distortion. Keywords Information security  Steganography  2LSB replacement  2LSB matching  Logistic map  Arnold’s cat map  Bat algorithm  Genetic algorithm

1 Introduction The digitization of our society has forced many institutions and consumers to follow this evolution quickly. As more countries adopt a faster and more efficient service approach, information exchange via the Internet is becoming a powerful tool for conducting these services in a multilocation environment in which services ecosystem can be reshaped [1]. Thus, more recently, this area has attracted considerable interest by integrating several services into networks such as e-banking, e-commerce, egovernment, e-health and e-business services. Unfortunately, with more organizations and consumers using these

& Lakhdar Laimeche [email protected] Abdallah Meraoumia [email protected] Hakim Bendjenna [email protected] 1

Laboratory of Mathematics, Informatics and Systems (LAMIS), University of Larbi Tebessi, Tebessa, Algeria

services in critical operations and information storage, users’ data are vulnerable to fraudulent and other malicious threats if they do not take appropriate measures to prevent cyber-attacks. Thus, due to the recent increase in the frequency and complexity of cyber-attacks, information security is one of the major concerns of the data exchange trend, such as ensuring the privacy of users’ data as well as their transactions during transmission via Internet [2]. So far, designing a ro