Skip to main content
Log in

Chaos based Zero-steganography algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. Zero-steg-anography is an imperceptible and undetectable data hiding technique as no change is made to the cover, hence not requiring any steganalysis. The proposed algorithm hides the payload based on certain relationship between the cover image, chaotic sequence and the payload, instead of directly embedding payload into the cover image which often leaves tell tale signs of steganography. Moreover, use of chaotic map in the process of data hiding provides improved security. Survivability of the proposed algorithm is analyzed against JPEG compression, noise and low-pass filtering attacks. Imperceptibility analysis reveals that the proposed algorithm is totally imperceptible regardless of the payload length. The proposed algorithm is also analyzed for security and is found to be secure, in highly compromised scenarios, where all except one of the key components required to retrieve payload are known to the adversary.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abdul W, Carré P, Gaborit P (2009) List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme. In: Proceedings of 16th IEEE international conference on image processing (ICIP), pp 3637–3640

  2. Anderson R, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481

    Article  Google Scholar 

  3. Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. Signal process 66(3):357–372

    MATH  Google Scholar 

  4. Bose R, Ray-Chaudhuri D (1960) On a class of error correcting binary group codes. Inf control 3(1):68–79

    Article  MATH  MathSciNet  Google Scholar 

  5. Cao H, Xiang H, Li X, Liu M, Yi S, Wei F (2006) A zero-watermarking algorithm based on DWT and chaotic modulation. In: Proceedings of SPIE, vol 6247, pp 1–9

  6. Chandramouli R, Memon N (2001) Analysis of LSB based image steganography techniques. In: Proceedings of IEEE international conference on image processing (ICIP), vol 3, pp 1019–1022

  7. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  8. Fridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. In: Proceedings of ACM multimedia security workshop, vol 20, pp 4–15

  9. Fridrich J (2005) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Information hiding, 7th international workshop, lecture notes in computer science, pp. 67–81 (2005)

  10. Fridrich J, Kodovskỳ J, Goljan M, Holub V (2011) Steganalysis of content-adaptive steganography in spatial domain. In: Information hiding, 13th international conference, lecture notes in computer science, pp 102–117

  11. Hamming R (1950) Error detecting and error correcting codes. Bell Syst Tech J 29(2):147–160

    Article  MathSciNet  Google Scholar 

  12. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77

    Article  MATH  Google Scholar 

  13. Huang HC, Wang FH, Pan JS (2001) Efficient and robust watermarking algorithm with vector quantisation. Electroni Lett 37(13):826–828

    Article  Google Scholar 

  14. Johnson N, Jajodia S (1998) Steganalysis of images created using current steganography software. In: Information hiding, 2nd international workshop, lecture notes in computer science, pp 273–289

  15. Johnson NF, Duric Z, Jajodia S, Memon N (2001) Information hiding: steganography and watermarking—attacks and countermeasures. J Electron Imaging 10(3):825–826

    Article  Google Scholar 

  16. Kahn D (1996) The history of steganography. In: Information hiding, 1st international workshop, lecture notes in computer science, pp 1–5

  17. Kessler G (2012) Steganography: Hiding data within data. An edited version of this paper with the title ‘’hiding data in data” appeared in April 2002 issue of windows & NET magazine. http://www.garykessler.net/library/steganography.html. Accessed 16 July

  18. Kim JR, Moon YS (1999) A robust wavelet-based digital watermarking using level-adaptive thresholding. In: Proceedings of 5th IEEE international conference on image processing (ICIP), vol 2, pp 226–230

  19. Lenti J (2000) Steganographic methods. Period Polytech, Electr Eng 44(3/4), 249–258

    Google Scholar 

  20. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. JIH-MSP 2(2):142–172

    Google Scholar 

  21. Li X, Zhang T, Zhang Y, Li W, Li K (2012) A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl 1–18. doi:10.1007/s11042-012-1112-2

  22. Lorenz E (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130–141

    Article  Google Scholar 

  23. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE TIFS 5(2):201–214

    MathSciNet  Google Scholar 

  24. May R (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    Article  Google Scholar 

  25. Murray J, VanRyper W (1996) Encyclopedia of graphics file formats, 2nd edn. O’Reilly Media

  26. Nutzinger M (2012) Real-time attacks on audio steganography. JIH-MSP 3(1):47–65

    Google Scholar 

  27. Peitgen H, Jürgens H, Saupe D (2004) Chaos and Fractals: new frontiers of science. Springer-Verlag

  28. Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX security symposium, vol 10, pp 323–336

  29. Reed IS, Solomon G (1960) Polynomial codes over certain finite fields. SIAM J Appl Math 8:300–304

    Article  MATH  MathSciNet  Google Scholar 

  30. Sabeti V, Samavi S, Shirani S (2012) An adaptive LSB matching steganography based on octonary complexity measure. Multimed Tools Appl 1–17. doi:10.1007/s11042-011-0975-y

  31. Sallee P (2004) Model-based steganography. In: Proceedings of the 2nd international workshop on digital watermarking, lecture notes in computer science, vol 2939, pp 254–260

  32. Schuster H, Just W (1988) Deterministic chaos. Wiley Online Library

  33. Singh S, Siddiqui TJ, Singh HV (2011) DCT based digital data hiding in image cover. IJSS 5(1):45–49

    Google Scholar 

  34. Singh S, Siddiqui TJ (2012) A security enhanced robust steganography algorithm for data hiding. IJCSI 9(1):131–139

    Google Scholar 

  35. Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Information hiding, 3rd international workshop, lecture notes in computer Science, pp 61–76

  36. Westfeld A (2001) F5—A steganographic algorithm. In: Information hiding, 4th international workshop, lecture notes in computer science, pp 289–302 (2001)

  37. Williams G (1997) Chaos theory tamed. CRC Press

  38. Wu D, Tsai W (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626

    Article  MATH  Google Scholar 

  39. Xiang H, Wang L, Lin H, Shi J (1999) Digital watermarking systems with chaotic sequences. In: Proceedings of the SPIE electronic imaging ’99 conference, vol 3657, pp 449–457

  40. Yen JC (2001) Watermarks embedded in the permuted image. In: IEEE international symposium on circuits and systems (ISCAS), vol 2, pp 53–56

  41. Zöllner J, Federrath H, Klimant H, Pfitzmann A, Piotraschke R, Westfeld A, Wicke G, Wolf G (1998) Modeling the security of steganographic systems. In: Information hiding, 2nd international workshop, lecture notes in computer science, pp 344–354

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Bilal.

Additional information

This work of Wadood Abdul and Sanaa Ghouzali was supported by the Research Center of College of Computer and Information Sciences and the Deanship of Scientific Research, King Saud University, under grant RC120911. The authors are grateful for this support.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bilal, M., Imtiaz, S., Abdul, W. et al. Chaos based Zero-steganography algorithm. Multimed Tools Appl 72, 1073–1092 (2014). https://doi.org/10.1007/s11042-013-1415-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1415-y

Keywords

Navigation