Design secure multi-level communication system based on duffing chaotic map and steganography

نویسندگان

چکیده

Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies hackers. They can be separately or together. Encryption involves basic principle of instantaneous conversion valuable information into a specific form unauthorized persons will not understand decrypt it. While is science embedding inside cover, in way cannot recognized seen by human eye. This paper presents high-resolution chaotic approach applied images hide information. A more secure reliable system designed include transmitted through transmission channels. done working use encryption work proposed new method achieves very high level hidden based on non-uniform systems generating random index vector (RIV) for within least significant bit (LSB) image pixels. prevents reduction quality. The simulation results also show peak signal noise ratio (PSNR) up 74.87 dB mean square error (MSE) values 0.0828, which sufficiently indicates effectiveness algorithm.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Chaotic Secure Communication Scheme Based on Duffing Oscillators and Frequency Estimation

This work presents a new technique to securely transmit and retrieve a message signal via chaotic systems. In our system, a two-valued message signal modulates the frequency of a Duffing oscillator sinusoidal term. An observer is used in the receiver side to retrieve the sinusoidal signal that contains the message and a novel frequency estimator is then used to reproduce an approximated estimat...

متن کامل

Digital Chaotic Scrambling of Voice Based on Duffing Map

With the significant development in communication systems especially in the public channels through which our information travels, there are more increasing in the channels problems. The information security is the important one that should be enhanced. This paper presents a chaos-based speech scrambling system. Chaotic maps have been successfully used for large-scale data encryption such as im...

متن کامل

Adaptive Observer Design for Chaotic Duffing System

Problem of unknown encoded parameter reconstruction is solved by means of procedure of design of adaptive observer for chaotic Duffing system. Unlike known analogues, the problem in question is only solved using measurements of output of chaotic system and in conditions of full parametrical uncertainty. Copyright © 2008 IFAC

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

A Chaotic Secure Communication System Design Based on Iterative Learning Control Theory

Abstract: This paper presents an application of Iterative Learning Control (ILC) theory to secure communication system design by using chaotic signals, where the logistic-map is employed as a source of chaos. Meanwhile, the ILC scheme is employed as a tool to encrypt and decrypt a message. A set of numerical experiments is realized to evidence the performance of our system, including the noisy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2022

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v25.i1.pp238-246