The International Arab Journal of Information Technology (IAJIT)


Optimal Image Based Information Hiding with One-dimensional Chaotic Systems and Dynamic Programming

Information hiding is a technology aimed at the secure hiding of important information into digital documents or media. In this paper, a new approach is proposed for the secure hiding of information into gray scale images. The hiding is performed in two stages. In the first stage, the binary bits in the sequence of information are shuffled and encoded with a set of integer keys and a system of one-dimensional logistic mappings. In the second stage, the resulting sequence is embedded into the gray values of selected pixels in the given image. A dynamic programming method is utilized to select the pixels that minimize the difference between a cover image and the corresponding stego image. Experiments show that this approach outperforms other information hiding methods by 13.1% in Peak Signal to Noise Ratio (PSNR) on average and reduces the difference between a stego image and its cover image to 0 in some cases.

[1] Abbasi R., Bin L., Chughtai G., Hassan H., Iqbai M., and Xu L., “A New Multilevel Reversible Bit-Planes Data Hiding Technique Based on Histogram Shifting of Efficient Compressed Domain,” Vietnam Journal of Computer Science, vol. 5, no. 5, pp. 185-196, 2018.

[2] Abdeljawad T., Banerjee S., and Wu G., “Discrete Tempered Fractional Calculus for New Chaotic Systems with Short Memory and Image Encryption,” Optik, vol. 218, pp. 163698, 2020.

[3] Alghafis A., Munir N., Khan M., and Hussain I., “An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System,” International Journal of Theoretical Physics, vol. 59, pp. 1227-1240, 2020.

[4] Arbelaez P., Maire M., Fowlkes C., and Malik J., “Contour Detection and Hierarchical Image Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 5, pp. 898-916, 2011.

[5] Chai X., Gan Z., Yuan K., Chen Y., and Liu X., “A Novel Image Encryption Scheme Based on DNA Sequence Operations and Chaotic Systems,” Neural Computing and Applications, vol. 31, pp. 219-237, 2019.

[6] Chang C. and Tseng H., “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letters, vol. 25, no. 12, pp. 1431-1437, 2004.

[7] Chen E., Min L., and Chen G., “Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption,” International Journal of Bifurcation Chaos, vol. 27, no. 3, pp. 1-17, 2017.

[8] Clark K., Vendt B., Smith K., Freymann J., Kirby J., Koppel, P., Moore S., Phillips S., Maffitt D., Pringle M., Tarbox L., and Prior F., “The Cancer Imaging Archive (TCIA): Maintaining and Operating a Public Information Repository,” Journal of Digital Imaging, vol. 26, no. 6, pp. 1045-1057, 2013.

[9] Fan Y., Liao Y., and Li F., Zhou S., Zhang G., “Identity-Based Auditing for Shared Cloud Data with Efficient and Secure Sensitive Information Hiding,” IEEE Access, vol. 7, pp. 114246- 114260, 2019.

[10] Hamza R., “A Novel Pseudo Random Sequence Generator for Image-Cryptographic Applications,” Journal of Information Security Applications, vol. 35, pp. 119-127, 2017.

[11] Jain A. and Rajpal N., “A Robust Image Encryption Algorithm Resistant to Attacks Using DNA and Chaotic Logistic Maps,” Multimedia Tools and Applications, vol. 75, pp. 5455-5472, 2016.

[12] Kelkar V., Tuckley K., and Nemade H., “Novel Variants of A Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity,” Journal of Healthcare Engineering, vol. 2017, 2017.

[13] Khalil M., “Medical Image Steganography: Study of Medical Image Degradation when Embedding Data in the Frequency Domain,” International Journal of Computer Network Information Security, vol. 9, no. 2, pp. 22-28, 2017.

[14] Khosravi M. and Yazdi M., “A Lossless Data Hiding Scheme for Medical Images Using A Hybrid Solution Based on Ibrw Error Histogram Computation and Quartered Interpolation with Greedy Weights,” Neural Computing and Applications, vol. 30, no. 7, pp. 2017-2028, 2018.

[15] Li M., Lu D., Wen W., Hua R., and Zhang Y., “Cryptanalyzing A Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System And Cellular Automata,” IEEE Access, vol. 6, pp. 47102-47111, 2018.

[16] Lin C., Chang C., and Wang, Z., “Reversible Data Hiding Scheme Using Adaptive Block Truncation Coding Based on an Edge-Based Quantization Approach,” Symmetry, vol. 11, no. 6, pp. 765, 2019.

[17] Liu Y., Chang C., and Nguyen T., “High Capacity Turtle Shell-Based Data Hiding,” IET Image Processing, vol. 10, no. 2, pp. 130-137, 2016.

[18] Liu Z. and Pun C., “Reversible Data-Hiding in Encrypted Images by Redundant Space Transfer,” Information Sciences, vol. 433, pp. 188-203, 2018, 10 The International Arab Journal of Information Technology, Vol. 19, No. 1, January 2022

[19] Liu Y., Yang C., Sun Q., Wu S., Lin S., and Chou Y., “Enhanced Embedding Capacity for the SMSD-Based Data-Hiding Method,” Signal Processing: Image Communication, vol. 78, pp. 216-222, 2019.

[20] Liu Y., Chang C., Huang P., and Hsu C., “Efficient Information Hiding Based on Theory of Numbers,” Symmetry, vol. 10, no. 1, 2018.

[21] Lu T., Tseng C., Huang S., and Nhan T., “Pixel- Value-Ordering Based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy,” Symmetry, vol. 10, no. 12, pp. 764, 2018.

[22] Luo Y., Qin J., Xiang X., Tan Y., Liu Q., and Xiang L., “Coverless Real-Time Image Information Hiding Based on Image Block Matching and Dense Convolutional Network,” Journal of Real-Time Image Processing, vol. 17, pp. 125-135, 2020.

[23] Song Y., Song J., and Qu J., “A Secure Image Encryption Algorithm Based on Multiple One- Dimensional Chaotic Systems,” in Proceedings of the 2nd IEEE International Conference on Computer and Communications, Chengdu, pp. 584-587, 2016.

[24] Suthanthiramani P., Sannasy M., Sannasi G., and Arputharaj K., “Secured Data Storage and Retrieval Using Elliptic Curve Cryptography In Cloud,” The International Arab Journal of Information Technology, vol. 18, no. 1, pp. 56- 66, 2021.

[25] Teng L., Wang X., and Meng J., “A Chaotic Color Image Encryption Using Integrated Bit- Level Permutation,” Multimedia Tools and Applications, vol. 77, pp. 6883-6896, 2018.

[26] Wang C., Wu N., Tsai C., and Hwang M., “A High Quality Steganographic Method with Pixel- Value Differencing and Modulus Function,” The Journal of Systems and Software, vol. 81, no.1, pp. 150-158, 2008.

[27] Wu H., Wu N., Tsai C., and Hwang M., “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings Vision, Image and Image Signal Process, vol. 152, no. 5, pp. 611-615, 2005.

[28] Zhang S., Gao T., and Yang L., “A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images,” International Journal of Network Security, vol. 18, no. 4, pp. 718-727, 2016.

[29] Zhu S. and Zhu C., “Image Encryption Algorithm with an Avalanche Effect Based on A Six- Dimensional Discrete Chaotic System,” Multimedia Tools and Applications, vol. 77, pp. 29119-29142, 2018.  learning and bioinformatics.