Professional Documents
Culture Documents
PRESENTATION
Presented by
JYOTHI R
( 1GG11EC017)
Under guidance
prof.REVANNA
Seminar co-ordinator
prof. NOORFATHIMA
CONTENTS
Introduction
Chaotic systems
The proposed system
Simulation results
Conclusion
Reference
INTRODUCTION
Steganography is the art and science of hiding secret data by
embedding them within other information.
The two most popular techniques used today to hide secret
information inside digital images are spatial
domain and transform domain.
The spatial domain technique embeds the bits of the secret
message straight to the least significant bits of the cover image.
This results in high
vulnerability to attacks such as formatting and image changes
The transform domain technique on the other hand hides
information in the significant parts of the cover
image in order to be more robust against attacks such as
filtering, cropping and lossy compression but still staying
imperceptible to the human sensitive system
CHAOTIC SYSTEMS
The equations of chaotic systems change over time because
they are dynamical systems. These equations are either
differential equations, which are called flows, or difference
equations, which are called maps.
there are two types of chaotic systems: chaotic flows and
chaotic maps.
Some of the well-known chaotic flows are the Lorenz
system and the Rössler system
some of the well known chaotic maps are the Logistic
map,the Hénonmap and the Arnold´s cat map.
A.Logistic Map
The logistic map is one of the popular and simplest chaotic
maps used for generating random sequences, it is a one
dimensional chaotic map. It has the following difference
Eqation:
where a and b are the control parameters. In order to
generate iterations of chaotic sequence, the value of a and
b must be 1.4 and 0.3 respectively .
C. Arnold's Cat Map
Arnold´s cat map is a two dimensional chaotic map. The pixels of
a digital image will be scrambled and the image looks noisy when
this chaotic map is applied to it. Arnold`s
cat map or as it is sometimes called Arnold´s transform has the
following equation:
where is the pixel location in the original image and is the new
pixel location in the scrambled image after Arnold´s
transformation, is the size of the image. The iteration of pixel
location in the image will result in scrambling the pixel location,
which means that the
image is encrypted using this chaotic map. Only the pixels
locations are changed not their values in this scrambling process .
THE PROPOSED SYSTEM
The proposed system hides a colored secret image of
different sizes into a color cover image of size
(512x512).The proposed system consists of two parts:
the transmitter and receiver part.
The Transmitter Part
cntd
[1] S. Thakar and M. Aggarwal, "A review –steganography, "International Journal of Advanced Research in
Computer Science and Software Engineering, Vol.3, No.12, December 2013, pp.528-532.
[2] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinivas, "Steganography: An overview," International
Journal of Engineering Science and Technology, Vol.2, No.10, November 2010, pp.5985- 5992.
[3] S. Atawneh, P. Sumari, "Hybrid and blind steganographic method for digital images based on DWT
and chaotic map," Journal of Communications, Vol.8, No.11, November 2013, pp.690-699.
[4] D. Bandyopadhyay, K. Dasgupta, J. Mandal and P. Dutta, "A Novel secure image steganography
method based on chaos theory in spatial domain," International Journal of Security, Privacy and Trust
Management, Vol.3, No.1, February 2014, pp.11-22.
[5] L. Jia, S. Shin and K. Yoo, "A reversible data hiding scheme using inverse embedding methods in
double-embedding strategies," IEEE International Conference on Informatics and Systems (INFOS 2010).
[6] M. Boora and M. Gambhir, "Binary text-image steganography," International Journal on Recent
Technology and Engineering, Vol.2, No.5, November 2013, pp.126-131.
[7] Z. Abdulhameed and M. Mahmood, "Steganography based on chaos and contourlet transform for
hiding multimedia data," International Journal of Electronics and Communication Engineering &
Technology, Vol.5, No.1, January 2014, pp.26-42.
[8] P. Manju and H. Rohil, "Optimized image steganography using discrete wavelet transform,"
International Journal of Recent Development in Engineering and Technology, Vol.2, No.2, February 2014,
pp.75-81.
[9] A. Mummert, S. Sara and J. Silver, "Numerical calculation of Lyapunov
exponents for three-dimensional systems of ordinary differential equations," M.Sc.
Thesis, The Graduate College of Marshall University, 2011.
[10] P. Addison, Fractals and chaos. Institute of Physics Publishing, Dirac House,
Temple Back, Bristol, UK, 1997.
[11] M. Alwa, T. El-Tobely, M. Fahmy, M. Nasr and M. Abd El-Aziz, "Fidelity and
robust digital watermarking adaptivity pixel based on medial pyramid of embedding
error gray scale images," International Journal of Computer Science and Network
Security, Vol.10, No.6,
June 2010, pp.284-314.
[12] Z. Ruimei, W. Mei, H. Boning and L. Hua, "Digital image watermarking based
on wavelet transform," Proceedings of third IEEE International Symposium on
Intelligent Information Technology Applications, 2009, pp.437-440.
[13] A. Verma, A. Nolkha, A. Singh and G. Jaiswal, "Implementation of image
steganography using 2-level DWT technique," International Journal of Computer
Science and Business Informatics, Vol.1, No.1,May 2013, pp.1-14.