Skip to main content

A Controllable Image Steganography with Chaos and User Key

  • Conference paper
  • First Online:
Image and Graphics (ICIG 2021)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 12888))

Included in the following conference series:

  • 1922 Accesses

Abstract

In recent years, the steganography of images has been greatly developed. In the existing image steganography algorithms, users cannot participate in the encryption process and cannot fully trust the steganography process. Therefore, this paper hopes to increase the importance of user roles in the steganography process so that it can control the hiding process. This paper is based on the classic F5 algorithm to improve, to achieve user participation, so that users can control the embedding position of secret information. At the same time, in response to the traditional methods of cracking the F5 algorithm and steganographic keys, chaos technology is incorporated on the basis of the original algorithm to jointly improve the overall security of the algorithm. This paper can effectively solve the problem of lack of user participation and security guarantee in existing steganography algorithms. This has important theoretical and practical significance for the application of steganography technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Y., Zhang, W., Li, W., Yu, X., Yu, N.: Non-additive cost functions for color image steganography based on inter-channel correlations and differences. IEEE Trans. Inf. Forens. Secur. 15, 2081–2095 (2020)

    Article  Google Scholar 

  2. Yang, Z., Wang, K., Ma, S., Huang, Y., Kang, X., Zhao, X.: IStego100K: large-scale image steganalysis dataset. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) Digital Forensics and Watermarking, pp. 352–364. Springer, Switzerland, Cham (2020)

    Chapter  Google Scholar 

  3. Yang, Z., Peng, X., Huang, Y.: A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 238, pp. 752–762. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_40

    Chapter  Google Scholar 

  4. Zhongliang, Y., Xueshun, P., Yongfeng, H., Chin-Chen, C.: A novel method of speech information hiding based on 3D-magic matrix. J. Internet Technol. 20(4), 1167–1175 (2019)

    Google Scholar 

  5. Couchot, J.-F., Couturier, R., Guyeux, C.: STABYLO: steganography with adaptive, BBS, and binary embedding at low cost. Ann. Telecommun. Annales des Télécommun. 70(9–10), 441–449 (2015)

    Article  Google Scholar 

  6. Yang, Z., Wei, N., Liu, Q., Huang, Y., Zhang, Y.: GAN-TStega: Text Steganography Based on Generative Adversarial Networks. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 18–31. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43575-2_2

    Chapter  Google Scholar 

  7. Boukis, A.C., Reiter, K., Frölich, M., Hofheinz, D., Meier, M.A.R.: Multicomponent reactions provide key molecules for secret communication. Nat. Commun. 9(1), 1439 (2018)

    Article  Google Scholar 

  8. Sarkar, T., Selvakumar, K., Motiei, L., Margulies, D.: Message in a molecule. Nat. Commun. 7(1), 11374 (2016)

    Article  Google Scholar 

  9. Qu, Z., Chen, S., Wang, X.: A secure controlled quantum image steganography algorithm. Quantum Inf. Process. 19(10), 1–25 (2020). https://doi.org/10.1007/s11128-020-02882-4

    Article  MathSciNet  Google Scholar 

  10. Yuwei, Y., Su, Y.: Research on security and authentication technology of two-dimensional code based on steganography and visual secret sharing. Intell. Comput. Appl. 10(08), 14–18 (2020)

    Google Scholar 

  11. Yang, Z.: Research on an adaptive multi-modal information hiding system. Central China Normal University (2020)

    Google Scholar 

  12. Kolmogorov, A.: On conservation of conditionally periodic motions under small per-turbations of the Hamiltonian. Dokl Akad Nauk SSSR 98, 527–530 (1954)

    MathSciNet  Google Scholar 

  13. Liu, W., Liu Yipei, Y.: Image encryption algorithm based on Logistic chaotic scrambling. Sci. Technol. Innov. 2020(36), 125–126 (2020)

    Google Scholar 

Download references

Acknowledgement

The authors are deeply indebted to anonymous reviewers for their constructive suggestions and helpful comments. The work is supported by the National Key Research and Development Program of China (No. 2019YFB1406504), the National Natural Science Foundation of China (No. U1836108, No. U1936216, No. 62002197, No. 62001038) and the Fundamental Research Funds for the Central Universities (No.2021RC30).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhen Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Wang, Y., Yang, Z., Zhang, R., Zhang, R. (2021). A Controllable Image Steganography with Chaos and User Key. In: Peng, Y., Hu, SM., Gabbouj, M., Zhou, K., Elad, M., Xu, K. (eds) Image and Graphics. ICIG 2021. Lecture Notes in Computer Science(), vol 12888. Springer, Cham. https://doi.org/10.1007/978-3-030-87355-4_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87355-4_65

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87354-7

  • Online ISBN: 978-3-030-87355-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics