A Technique For Digital Steganography Using Chaotic Maps
A Technique For Digital Steganography Using Chaotic Maps
DOI 10.1007/s11071-013-1105-3
O R I G I N A L PA P E R
Received: 4 July 2013 / Accepted: 30 September 2013 / Published online: 31 October 2013
© Springer Science+Business Media Dordrecht 2013
Abstract Chaos has been applied extensively in se- signal to noise ratio, and mean square error have also
cure communication over the last decade, but most been carried out and shown that it can survive against
of the chaotic security protocols defined, are crypto- various differential attacks such as the known message
graphically weak or slow to compute. Also, study of attack, known cover attack, known stego attack, and
chaotic phenomena as application in security area is stego only attack.
not discussed in detail. In this paper, we have intensely
studied chaos, their influence in secure communica- Keywords Chaotic sequence · Secure
tions and proposed a steganography technique in spa- communication · Statistical analysis
tial domain for digital images based upon chaotic
maps. By applying chaos effectively in secure com-
munication, the strength of the overall anticipated al- 1 Introduction
gorithm has been increased to a significant level. In
addition, few security statistical analyses such as cor- Steganography is the science that falls under the cat-
relation, entropy, energy, contrast, homogeneity, peak egory of secure communications. Its original theme
is to visually hide the secret data in a carrier dur-
ing communication [1–3]. It can be interwoven with
A. Anees (B) · A.M. Siddiqui two other types of security systems, namely cryptog-
Department of Electrical Engineering, Military College raphy and watermarking. The purpose of cryptogra-
of Signals, National University of Science and Technology,
phy and steganography is the same, i.e., to conceal
Islamabad, Pakistan
e-mail: [email protected] the information message, but the methodologies em-
ployed in these techniques are different. The method-
A.M. Siddiqui
e-mail: [email protected] ology of watermarking and steganography is the same,
but the purposes of these techniques are different. Wa-
J. Ahmed termarking deals with copyright protection of digital
Department of Electrical Engineering, HITEC University,
data while steganography concerns about the hiding of
Taxila, Pakistan
e-mail: [email protected] digital data. Although for last couple of millennium,
the science of cover writing (steganography) has been
I. Hussain used in diversified forms [4], but can be comprehen-
Department of Sciences and Humanities, National
sively divided into two categories. The first one is lin-
University of Computer & Emerging Sciences, Islamabad,
Pakistan guistic steganography, which uses the natural language
e-mail: [email protected] as a carrier in hiding the original message and widely
Fig. 1 Generalized
proposed chaotic
steganographic algorithm
illustrating the basic idea of
embedding information
message into two parts of a
carrier
used in ancient time. In the early fifth century BC, His- Data hiding in Least Significant Bits (LSBs) is a
taiacus tried to conceal the secret information in the simple and straightforward technique that has also the
form of a tattoo made on slave’s shaved head and dis- advantage of embedding more information than the
patched after his hair grew back with the message [5]. transform techniques keeping the texture of digital
The second class, technical steganography, which is image almost unaffected. But the problem with spa-
more of a modern category employs the digital data as tial techniques is the low robustness against statistical
carrier, such as images, video, audio, and text. analysis and differential attacks. In this paper, we have
With the evolution of chaotic theory in recent employed chaos to propose a chaotic steganographic
decades, chaos has been applied extensively in se- algorithm in spatial domain, which not only proved se-
cure communications. Chaotic dynamics are the im- cure against different attacks, but also exhibited good
promptu behavior exhibited by some nonlinear dy- statistical analysis. Message, in binary data is broken
namical systems and can be used as a source of dif- into LSBs and MSBs and are placed in a carrier in its
two different areas, respectively, and further at random
fusion in security techniques [6]. It has been shown
positions in these areas defined by chaotic sequences.
that chaotic security algorithms have commended sev-
Figure 1 illustrates this idea.
eral advantages such as high security, speed, rea-
sonable computational overheads, and computational
power over the traditional algorithms. Also, steganal-
2 Mathematical modeling and chaotic maps
ysis which includes chosen stego attack, stego-only
attack, known stego attack, known cover attack, and Let suppose C denotes the carrier signal in which mes-
statistical measures of chaotic steganographic algo- sage signal, denoted by M has to be placed. A stego-
rithms illustrate exceptional results over the custom- function ϕ takes the input C and M and generates
ary algorithms. However, at the same time, this ex- stego-signal, S.
ponential growth in chaotic security area leads to the
rapid publication of those papers, which are not se- S = ϕ(C, M) (1)
cure enough and shows several flaws, especially the
early proposed analog chaotic security approaches. The carrier C can be in any form, from human beings
Recently published, a number of papers represent sta- themselves [2] to multimedia such as image, audio,
tistical analysis of chaotic security systems showing and video files. At the receiving end, original informa-
the flaws in the strength of secure algorithms and can tion message signal, M retrieved by applying inverse
stego-function, ϕ −1 on stego-signal S.
be easily broken in short computer times. Also, the
performance analysis and security issues did not take M = ϕ −1 (S) (2)
due attention in proposing these techniques, which pay
off as to be weak against differential attacks, while the The strength of any steganographic algorithm lies in
safer ones cannot be effectively implemented on the the stego-function, ϕ. Different people from differ-
given hardware. ent scientific backgrounds has presented various stego
A technique for digital steganography using chaotic maps 809
Fig. 3 Bifurcation diagram of logistic map for r = 0 to 3 show- gistic sequence against number of iterations for different values
ing the stable behavior (a) showing the plot for logistic se- of r = 1.1, 1.5, 2.0, 2.5, respectively
quence against parameter r and (b)–(d) shows the plot for lo-
icity further increases by the factor of two and the small difference, i.e., x0 = 0.10000 and x0 = 0.10001.
sequence swings between the eight values as men- The two graphs matched detail for detail until the 22nd
tioned in Fig. 4(e). iteration, then they started to separate apart and by the
• When r ∈ [3.6, 4), the periodicity disappears from end of 50th iteration, they are completely out of phase
iterative sequence and exhibits chaotic behavior. with the initial difference as small as one part in a ten
Figure 5(a) shows the graph plotted for logistic se- thousand.
quence against values of r from r = 3.5 to 4, i.e.,
Not only have map sequences differ for different
zooming the Fig. 2 for the chaotic sequence. Fig-
values of x0 , but also due to the different values of r.
ures 5(b)–(d) shows the plots for different values of
r showing the chaotic sequences against the number Figure 6(b) shows two graphs laid on each other for
of iterations. logistic map with constant value of x0 and two values
of r with small difference, i.e., r = 3.7000 and r =
One of the essential properties of any chaotic se-
3.7001. Again numeric data of logistic map behaves
quence is sensitive dependence on initial conditions.
as same as earlier, two graphs have same values until
It is must for every chaotic map to exhibit this prop-
the 22nd iteration and then stays differ vigorously up
erty as for the logistic map as well. After sketching
the graph for logistic map with slightly different initial to 50th iteration.
values, we can easily visualize the effect of sensitive This property makes chaotic maps effective in se-
dependence on initial values. Figure 6(a) illustrates cure communication. It is very difficult to predict the
two graphs laid on each other for logistic map with initial conditions based upon chaotic sequences fetch
constant value of r = 3.7 and two values of x0 with after cipher text attack; this is the reason why our an-
A technique for digital steganography using chaotic maps 811
Fig. 4 Bifurcation diagram of logistic map for r = 3 to 3.5 quence with periodicity two for r = 3.0, 3.3, (d) periodicity four
showing the periodic behavior (a) showing the plot for logis- for of r = 3.5, and (e) periodicity eight for of r = 3.5
tic sequence against parameter r, (b)–(c) shows the periodic se-
ticipated algorithm is so strong against the traditional y0 = μ 1 − x02 (8)
algorithms.
x0 2
The rest of two algorithms have the same properties k0 = − μ (9)
described earlier for logistic map; the mathematics of y0
these maps are defined as follows. tan α + k0
TD-ERCS system was developed in 2004 by Yuan k0 = − (10)
1 − k0 tan α
Sheng Lee [12, 13] defined as ⎧
⎪
⎪ μ ∈ (0, 1]
⎧ ⎪
⎪
⎪ 2kn−1 yn−1 + xn−1 (μ2 − kn−1
2 ) ⎨x ∈ [−1, 1]
⎪
⎪ = − 0
⎨ n
x are the system seed parameters
μ2 + kn−1
2 ⎪
⎪ α ∈ (0, π)
⎪
⎪
⎪
⎪ 2kn−m − kn−1 + kn−1 kn−m
2 ⎩m = 2, 3, 4, 5, . . .
⎪
⎩kn = , n = 1, 2, 3, . . .
1 + 2kn−1 kn−m − kn−m
2
Fig. 5 Bifurcation diagram of logistic map for r = 3.56 to 4 gistic sequence against number of iterations for different values
showing the chaotic behavior (a) showing the plot for logistic of r = 3.75, 3.80, 3.85, 3.90, respectively
sequence against parameter r and (b)–(d) shows the plot for lo-
Fig. 6 Iterative sequence of logistic map showing the property ferent initial values of x = 0.10000 and x = 0.10001. (b) Plot
of sensitive dependence on initial conditions. (a) Plot of logistic of logistic map with constant initial value of x = 0.1 and two
map with constant initial value of r = 3.7 and two slightly dif- slightly different initial values of r = 3.7000 and r = 3.7001
A technique for digital steganography using chaotic maps 813
3 Proposed algorithm and simulated results where i, j corresponds to image pixels positions;
p(i, j ) is pixel value at ith row and j th column; μ
is the variance; σ is the standard deviation.
The proposed algorithm shown in the form of flow-
chart in Fig. 7 employs in spatial domain and embeds 4.2 Entropy
the information in LSBs of carrier image. The carrier
image is first broken into two parts, upper and lower, Entropy is a magnitude of the uncertainty of a random
respectively. The information signal is converted into variable to come in a random process and can be used
binary of eight bits and split into four MSBs and four to show the randomness of the digital image as well.
LSBs. The information MSBs is embedded into up- Entropy is defined as
per part of carrier signal and LSBs are in its lower n
part. The chaotic maps engaged in proposed algo- H =− p(xi ) log2 p(xi ) (13)
rithm define the exact positions in upper and lower i=1
part for embedding of information bits, that is, TD-
where p(xi ) is the probability of random variable x at
ERCS map defines the row number, NCA map defines
ith index.
the column number, and the logistic map defines the
frame number. After selecting the specific pixel of car- 4.3 Homogeneity
rier image for embedding information, it is converted
into binary and split into MSBs and LSBs. Its LSBs The homogeneity analysis processes the closeness of
are then replaced with respective information bits. Af- the distribution in the gray level cooccurrence matrix
ter embedding each symbol of information, upper and (GLCM) to the GLCM diagonal. The GLCM shows
lower parts of the carrier joins and makes the stegano- the measurements of combinations of pixel brightness
graphic image. The LSBs are replaced of the carrier values or gray levels in tabular form. The frequency
image and are considered as a loss of information or of the patterns of gray levels can be inferred from the
regarded as an addition of noise in it. For extraction GLCM table. The homogeneity can be determined as
of information, reverse methodology is applied. Fig-
p(i, j )
ure 8(a) shows the original image and Fig. 8(b) shows Hom = (14)
1 + |i − j |
the steganographic image. i,j
814 A. Anees et al.
Table 1 Statistical security analysis for red frame of original Table 3 Statistical security analysis for blue frame of original
and steganographic images and steganographic images
Table 2 Statistical security analysis for green frame of original 4.5 Energy
and steganographic images