High Secure Image Steganography based on Hopfield Chaotic Neural Network and Wavelet Transforms

نویسندگان

  • B. Geetha
  • E. V. Prasad
چکیده

Steganography is an art of hiding the information without any change in the external appearance of the cover object. Cryptography is a technique to make the information unreadable for unauthorized users. Making the data unreadable and hiding it, will make the data highly secure. Image steganography allows the user to hide a large amount of data inside an image. On transmission side Steganography is performed by choosing a Cover-Image then hiding the text within the image. On receiving side the secret text is extracted from the stego image. In this paper, High Secure steganography algorithm is proposed. This process contains three stages. In the first stage, the text is encrypted by using a traditional encryption method i.e Caeser method. In the second stage the cipher text is again encrypted by using the chaotic neural network and in the third stage the resulting encrypted text is embedded inside the image using DWT. High security can be achieved by encrypting the text using Chaotic Neural Network. The binary sequence of the encrypted text created by Chaotic neural network is unpredictable making it highly secure.The Proposed algorithm is tested against different gray scale images considering PSNR, MSE and SSIM for evaluation. It is observed that the security is increased with acceptable PSNR compared to other methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable and Highly Secured Image Steganography Based on Hopfield Chaotic Neural Network and Wavelet Transforms

Steganography is the science of communicating in the hidden manner. This paper presents a robust and secured Image Steganography method capable of embedding high volume of text information in digital cover-image without incurring any perceptual distortion. The method is based on compression and encryption. In order to achieve high capacity, dictionary based lossless compression techniques are u...

متن کامل

A Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT

In today’s world, there are a number of cryptographic and steganography techniques used in order to have secured data transfer between a sender and a receiver. In this paper a new hybrid approach that integrates the merits of cryptography and audio steganography is presented. First, the original message is encrypted using chaotic neural network and the resultant cipher text is embedded into a c...

متن کامل

Forecasting Stock Market Using Wavelet Transforms and Neural Networks: An integrated system based on Fuzzy Genetic algorithm (Case study of price index of Tehran Stock Exchange)

The jamor purpose of the present research is to predict the total stock market index of Tehran Stock Exchange, using a combined method of Wavelet transforms, Fuzzy genetics, and neural network in order to predict the active participations of finance market as well as macro decision makers.To do so, first the prediction was made by neural network, then a series of price index was decomposed by w...

متن کامل

Neural Network Performance Analysis for Real Time Hand Gesture Tracking Based on Hu Moment and Hybrid Features

This paper presents a comparison study between the multilayer perceptron (MLP) and radial basis function (RBF) neural networks with supervised learning and back propagation algorithm to track hand gestures. Both networks have two output classes which are hand and face. Skin is detected by a regional based algorithm in the image, and then networks are applied on video sequences frame by frame in...

متن کامل

High Imperceptible Encoding for Computer Networks Security

Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. Digital Steganography exploits the use of a host data to hide a pie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013