A chaos-based approach for information hiding security
نویسندگان
چکیده
This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory. In this paper, a scheme is considered as secure if its behavior is proven unpredictable. The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one. This new definition of security is based on the notion of topological chaos. It could be used to reinforce the confidence on a scheme previously proven as secure by other approaches and it could also be used to study some classes of attacks that currently cannot be studied by the existing security approaches. After presenting the theoretical framework of the study, a concrete example is detailed in order to show how our approach can be applied.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملPreparation of Papers for ICIET Conferences: Embedded Data with Image using Chaos based Particle Swarm Optimization(PSO)
Data hiding is also known as data encapsulation or information hiding, it reduces system complexity for increased robustness .Proposed approach provides optimal solution for performing data hiding. The goal of data hiding technique is to embed the secret data into the cover image with minimum changes in the pixel values. Here the secret data is generated and embedded into the cover image by ran...
متن کاملHigh capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1005.0704 شماره
صفحات -
تاریخ انتشار 2010