Skip to main content

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography

  • Conference paper
Advances in Natural Computation (ICNC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3612))

Included in the following conference series:

  • 2088 Accesses

Abstract

In this paper, we propose the steganalysis based on sequence synchronization analysis against chaos based spread spectrum image steganography (CSSIS). This method uses the correlation between the estimated chaotic sequences in two stegoimages to buildup synchronization measure, which can effectively detect the presence of CSSIS. Based on the analysis, a more secure method is presented, which is constructed on key transmission channel (KTC). This improved method uses the stochastic modulation to realize the steganography. It avoids the sequences synchronization fault in CSSIS by randomly choosing the parameters of chaotic map, which is proved by the experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM System Journal 35(3/4), 131–336 (1996)

    Google Scholar 

  2. Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8(8), 1075–1083 (1999)

    Article  Google Scholar 

  3. Satish, K., Jayakar, T., Tobin, C., Madhavi, K., Murali, K.: Chaos Based Spread Spectrum Image Steganography. IEEE Transactions on Consumer Electronics 50(2), 578–590 (2004)

    Article  Google Scholar 

  4. Chen, B., Wornell, G.W.: Quantization index modulation: A Class.of provably Good Methods for Digital Watermarking and information Embedding. IEEE Transaction on Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  5. Hartung, F., Girod, B.: Watermarking of Uncompressed and Compressed Video. Signal Processing (Special issue on Watermarking) 66(3), 283–301 (1998)

    MATH  Google Scholar 

  6. Fridrich, J., Goljan, M.: Digital Image Steganography Using Stochastic Modulation. In: Proc. EI SPIE, Santa Clara, January 2003, pp. 191–202 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, G., Wang, J., Dai, Y., Wang, Z. (2005). On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539902_123

Download citation

  • DOI: https://doi.org/10.1007/11539902_123

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28320-1

  • Online ISBN: 978-3-540-31863-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics