Skip to main content
Log in

Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The popularity of wireless multimedia applications in real life and the open nature of wireless media for access make the security of confidential multimedia over wireless channels a major task. This paper proposes a two multi-layer security algorithm using steganography with encryption that strengthens the image security through its transmission over a wireless channel. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The suitability of image as a cover medium is due to abundance of redundant bits, and bulk data capacity. The chaos based encryption algorithms are adopted in this paper. In this work a confidential image is embedded into a cover image using least significant bit steganography, and then the output stego image is encrypted using a 2-D Logistic map or 2-D chaotic Baker map. The encrypted stego image is then transmitted over a wireless AWGN channel and the reverse processes are implemented to extract the received secret image. Several experiments have been carried out to examine the suitability of the proposed algorithms for securing high sensitivity images through transmission over wireless channels at different noise levels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

References

  1. Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT and compression techniques on raw images. In IEEE-0-7803-9588-3/05/$20.00 ©2005.

  2. Neeta, D., Wagh, K. K., Snehal, K., & Jacobs, D. (2006). Implementation of LSB steganography and its evaluation for various bits. In 1st international conference on digital information management (pp. 173–178).

  3. Juneja, M., & Sandhu, P. S. (2009). Designing of robust image steganography technique based on LSB insertion and encryption. In International conference on advances in recent technologies in communication and computing.

  4. Chen, G. R., Mao, Y. B., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat map. Chaos, Solitons & Fractals, 21, 749–761.

    Article  MathSciNet  MATH  Google Scholar 

  5. Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.

    Article  Google Scholar 

  6. Arun, A. S., & Joseph, G. M. (2013). High security cryptographic technique using steganography and chaotic image encryption. IOSR Journal of Computer Engineering, 12(5), 49–54.

    Article  Google Scholar 

  7. Mehta, A. M., Lanzisera, S., & Pister, K. S. J. (2008). Steganography in 802.15.4 wireless communication. In 2nd international symposium on advanced networks and telecommunication systems, ANTS.

  8. Choudhary, K. (2012). Image steganography and global terrorism. Global Security Studies, 3(4), 115–135.

    Google Scholar 

  9. Kamal, A. H. M. (2013). Steganography: Securing message in wireless network. International Journal of Computers & Technology, 4(3), 797–801.

    Google Scholar 

  10. Owens, M. (2002). A discussion of covert channels and steganography. Bethesda, MD: SANS Institute.

    Google Scholar 

  11. Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer Journal, 31(2), 26–34.

    Article  Google Scholar 

  12. Chen M., Zhang, R., Niu, X., & Yang Y. (2006). Analysis of current steganography tools: Classifications & features. In International conference on intelligent information hiding and multimedia signal processing (IIH-MSP’06), IEEE-0-7695-2745-0/06 $20.00 © 2006.

  13. Stuti, G., Rana, A., & Kaur, M. (2013). Comparison of image steganography techniques. International Journal of Computers and Distributed Systems, 3(I), 20–30.

    Google Scholar 

  14. Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Science Direct, Image and Vision Computing, 24, 926–934.

    Article  Google Scholar 

  15. Srividya, G., Nandakumar, P. (2011). A Triple-Key chaotic image encryption method. In 2011 international conference on communications and signal processing (ICCSP) (pp. 266–270).

  16. Ahmad, M., & Alam, M. S. (2009). A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering, 2(1), 46–50.

    Google Scholar 

  17. Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8, 1259–1284.

    Article  MathSciNet  MATH  Google Scholar 

  18. El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 4. doi:10.1186/1687-4722-2012-4.

    Article  Google Scholar 

  19. Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM. Wireless Personal Communications, 79(3), 2141–2154.

    Article  Google Scholar 

  20. Silva, E. A., Panetta, K., Agaian, S. S. (2007). Quantifying image similarity using measure of enhancement by entropy. In SPIE proceedings Vol. 6579, mobile multimedia/image processing for military and security applications.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nassar, S.S., Ayad, N.M., Kelash, H.M. et al. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering. Wireless Pers Commun 91, 1023–1049 (2016). https://doi.org/10.1007/s11277-016-3387-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3387-5

Keywords

Navigation