Subject Review: Information Hiding Using Chaotic Map
Keywords:Information hiding, Steganography, Cryptography, Chaotic Map, Least significant bit
It is vital to convert information into an unidentifiable form in order to protect your confidential information from intruders. As a result, intruders will be unable to obtain your original information. As a result, security is the most difficult component for all users who wish to share their confidential information. In recent years, because of the quick rise of the internet and quick communication technology, the security and confidentiality of sensitive information have become a top priority and worry.
Information concealment is the technique of communicating secret information in a suitable carrier, such as a picture, video, or voice. Various technologies for information concealment, such as encryption, steganography, hashing, and authentication, have been developed and are in use today to safeguard information from unauthorized access.
Steganography's principal purpose is to conceal the existence of secure information, making it difficult for an unauthorized person to discover it. Steganography is the art of concealing information sensitive information in any medium in order to send it through a communication network in a secure manner.
The main goal of this paper is to examine and describe strategies for hiding information within multimedia using chaotic maps, as well as to compare various methods.
Komal Pate, Sumit Utareja, Hitesh Gupta, "A Survey of Information Hiding Techniques", International Journal of Emerging Technology and Advanced Engineering, January 2013, Volume 3, Issue 1.
Sabu M Thampi, "Information Hiding Techniques: A Tutorial Review".
Richa Gupta1, Sunny Gupta2, Anuradha Singha, " Importance and Techniques of Information Hiding: A Review", International Journal of Computer Trends and Technology (IJCTT), Mar 2014, volume 9 number 5.
Peipei Liu, Zhongliang Zhu, Hongxia Wang Tianyun Yan, "A Novel Image Steganography Using Chaotic Map and Visual Model".
Jianhua Song, Qun Ding, "An information hiding method based on LSB and tent chaotic map," Proc. SPIE 8009, Third International Conference on Digital Image Processing (ICDIP 2011), 800920 (8 July 2011).
Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez, "A New Chaos Steganography Algorithm
for Hiding Multimedia Data", ICACT2012, Feb. 19-22, 2012.
MELAD J. SAEED, "A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE", Journal of Engineering Science and Technology, 2013, Vol. 8, No. 5, pages 508 – 520.
Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder, "Chaos based Edge Adaptive Image Steganography", International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013.
D. Battikh, S. El Assad, B. Bakhache, O. Deforges, M. Khalil, "Chaos-based Spatial Steganography System for Images" , International Journal of Chaotic Computing (IJCC), Volume 3, Issue 1, June 2014/2015.
Sujarani Rajendran, Manivannan Doraipandian, "Chaotic Map Based Random Image Steganography Using LSB Technique", International Journal of Network Security, July 2017, Vol.19, No.4, PP.593-598.
Hassan Elkamchouchi , Wessam M. Salama , Yasmine Abouelseoud, "Data Hiding in a Digital Cover Image Using Chaotic Maps and LSB Technique", Proceedings of ICCES 2017 12th International Conference on Computer Engineering and Systems.
Aya H. S. Abdelgader , Raneem A. Aboughalia , Osama A. S. Alkishriwo, " Combined Image Encryption and Steganography Algorithm in the Spatial Domain", First Conference for Engineering Sciences and Technology (CEST-2018) 25-27 September 2018 / Libya.
Ola N. Kadhim and Zahir M. Hussain, "Information Hiding using Chaotic-Address Steganography", Journal of Computer Science 2018, 14 (9): pages 1247-1266.of Computer Science
Yasser Mohammad Al-Sharo, "Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer", International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol. 10, No. 4.
Zahraa Salah Dhaief, Raniah Ali Mustafa and Amal Abdulbaqi Maryoosh, " Hiding Encrypted Text in Image using Least Significant Bit image Steganography Technique", International Journal of Engineering Research and
Advanced Technology (IJERAT), 8 August -2020, Volume.6, Issue.
Aya Jaradat, Eyad Taqieddin, and Moad Mowafi, "A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization" , Hindawi Security and Communication Networks, Volume 2021, Article ID 6679284, 11 pages.
A. A. Karawia, "Medical image steganographic algorithm via modified LSB method and chaotic map", The Institution of Engineering and Technology, Article in IET Image Processing • May 2021.
How to Cite
Copyright (c) 2021 Zahraa Salah Dhaief, Raniah Ali Mustafa, Amal Abdulbaqi Maryoosh
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.