Design secure multi-level communication system based on duffing chaotic map and steganography
نویسندگان
چکیده
Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies hackers. They can be separately or together. Encryption involves basic principle of instantaneous conversion valuable information into a specific form unauthorized persons will not understand decrypt it. While is science embedding inside cover, in way cannot recognized seen by human eye. This paper presents high-resolution chaotic approach applied images hide information. A more secure reliable system designed include transmitted through transmission channels. done working use encryption work proposed new method achieves very high level hidden based on non-uniform systems generating random index vector (RIV) for within least significant bit (LSB) image pixels. prevents reduction quality. The simulation results also show peak signal noise ratio (PSNR) up 74.87 dB mean square error (MSE) values 0.0828, which sufficiently indicates effectiveness algorithm.
منابع مشابه
A Chaotic Secure Communication Scheme Based on Duffing Oscillators and Frequency Estimation
This work presents a new technique to securely transmit and retrieve a message signal via chaotic systems. In our system, a two-valued message signal modulates the frequency of a Duffing oscillator sinusoidal term. An observer is used in the receiver side to retrieve the sinusoidal signal that contains the message and a novel frequency estimator is then used to reproduce an approximated estimat...
متن کاملDigital Chaotic Scrambling of Voice Based on Duffing Map
With the significant development in communication systems especially in the public channels through which our information travels, there are more increasing in the channels problems. The information security is the important one that should be enhanced. This paper presents a chaos-based speech scrambling system. Chaotic maps have been successfully used for large-scale data encryption such as im...
متن کاملAdaptive Observer Design for Chaotic Duffing System
Problem of unknown encoded parameter reconstruction is solved by means of procedure of design of adaptive observer for chaotic Duffing system. Unlike known analogues, the problem in question is only solved using measurements of output of chaotic system and in conditions of full parametrical uncertainty. Copyright © 2008 IFAC
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملA Chaotic Secure Communication System Design Based on Iterative Learning Control Theory
Abstract: This paper presents an application of Iterative Learning Control (ILC) theory to secure communication system design by using chaotic signals, where the logistic-map is employed as a source of chaos. Meanwhile, the ILC scheme is employed as a tool to encrypt and decrypt a message. A set of numerical experiments is realized to evidence the performance of our system, including the noisy ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v25.i1.pp238-246