Abstract
In recent years, the steganography of images has been greatly developed. In the existing image steganography algorithms, users cannot participate in the encryption process and cannot fully trust the steganography process. Therefore, this paper hopes to increase the importance of user roles in the steganography process so that it can control the hiding process. This paper is based on the classic F5 algorithm to improve, to achieve user participation, so that users can control the embedding position of secret information. At the same time, in response to the traditional methods of cracking the F5 algorithm and steganographic keys, chaos technology is incorporated on the basis of the original algorithm to jointly improve the overall security of the algorithm. This paper can effectively solve the problem of lack of user participation and security guarantee in existing steganography algorithms. This has important theoretical and practical significance for the application of steganography technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, Y., Zhang, W., Li, W., Yu, X., Yu, N.: Non-additive cost functions for color image steganography based on inter-channel correlations and differences. IEEE Trans. Inf. Forens. Secur. 15, 2081–2095 (2020)
Yang, Z., Wang, K., Ma, S., Huang, Y., Kang, X., Zhao, X.: IStego100K: large-scale image steganalysis dataset. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) Digital Forensics and Watermarking, pp. 352–364. Springer, Switzerland, Cham (2020)
Yang, Z., Peng, X., Huang, Y.: A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 238, pp. 752–762. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_40
Zhongliang, Y., Xueshun, P., Yongfeng, H., Chin-Chen, C.: A novel method of speech information hiding based on 3D-magic matrix. J. Internet Technol. 20(4), 1167–1175 (2019)
Couchot, J.-F., Couturier, R., Guyeux, C.: STABYLO: steganography with adaptive, BBS, and binary embedding at low cost. Ann. Telecommun. Annales des Télécommun. 70(9–10), 441–449 (2015)
Yang, Z., Wei, N., Liu, Q., Huang, Y., Zhang, Y.: GAN-TStega: Text Steganography Based on Generative Adversarial Networks. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 18–31. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43575-2_2
Boukis, A.C., Reiter, K., Frölich, M., Hofheinz, D., Meier, M.A.R.: Multicomponent reactions provide key molecules for secret communication. Nat. Commun. 9(1), 1439 (2018)
Sarkar, T., Selvakumar, K., Motiei, L., Margulies, D.: Message in a molecule. Nat. Commun. 7(1), 11374 (2016)
Qu, Z., Chen, S., Wang, X.: A secure controlled quantum image steganography algorithm. Quantum Inf. Process. 19(10), 1–25 (2020). https://doi.org/10.1007/s11128-020-02882-4
Yuwei, Y., Su, Y.: Research on security and authentication technology of two-dimensional code based on steganography and visual secret sharing. Intell. Comput. Appl. 10(08), 14–18 (2020)
Yang, Z.: Research on an adaptive multi-modal information hiding system. Central China Normal University (2020)
Kolmogorov, A.: On conservation of conditionally periodic motions under small per-turbations of the Hamiltonian. Dokl Akad Nauk SSSR 98, 527–530 (1954)
Liu, W., Liu Yipei, Y.: Image encryption algorithm based on Logistic chaotic scrambling. Sci. Technol. Innov. 2020(36), 125–126 (2020)
Acknowledgement
The authors are deeply indebted to anonymous reviewers for their constructive suggestions and helpful comments. The work is supported by the National Key Research and Development Program of China (No. 2019YFB1406504), the National Natural Science Foundation of China (No. U1836108, No. U1936216, No. 62002197, No. 62001038) and the Fundamental Research Funds for the Central Universities (No.2021RC30).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, J., Wang, Y., Yang, Z., Zhang, R., Zhang, R. (2021). A Controllable Image Steganography with Chaos and User Key. In: Peng, Y., Hu, SM., Gabbouj, M., Zhou, K., Elad, M., Xu, K. (eds) Image and Graphics. ICIG 2021. Lecture Notes in Computer Science(), vol 12888. Springer, Cham. https://doi.org/10.1007/978-3-030-87355-4_65
Download citation
DOI: https://doi.org/10.1007/978-3-030-87355-4_65
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87354-7
Online ISBN: 978-3-030-87355-4
eBook Packages: Computer ScienceComputer Science (R0)