Subscribe Now Subscribe Today
Science Alert
Curve Top
Information Technology Journal
  Year: 2014 | Volume: 13 | Issue: 15 | Page No.: 2404-2410
DOI: 10.3923/itj.2014.2404.2410
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

An Automatically Changing Feature Method based on Chaotic Encryption

Wang Li, Gang Luo and Lingyun Xiang

In practical applications, in order to extract data from the stego, some data hiding encryption methods need to identify themselves. When performing data hiding, they embed some specific logo for self-identification. However, it is unavoidable to bring themselves the risk of exposure. Suppose each hidden method has a corresponding logo S and the attacker has a logo set Φ which consists of some hidden methods’ logos. Once he find the logo S which matches a logo in Φ, he can easily recognize the very method. To solve this problem, we propose a method based on synchronization to hide the specific sign or logo. First, the sender generates a key using a public variable parameter which is always changing from time to time. Then, we can calculate the hidden data’s location in the cover from the key. According to the locations, we can embed the logo into the cover. As the public parameter is changing from time to time, each transmission of hidden data has a unique location sequence. When the stego reaches its receiver, according to the public parameter, the receiver could generate the key and get the hidden data’s location to extract the secret data correctly. Experimental results verify that the data hiding method performs well and hardly has impacts on the cover’s quality and has little impacts on the robustness, imperceptibility and capacity of the original stego-cover. Besides, it is able to recover the key with linear time complexity when the critical information which is used to generate the key is missing.
PDF Fulltext XML References Citation Report Citation
  •    Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
  •    A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model
  •    MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
  •    Gyratory Assisted Info Hide-A Nibble Differencing for Message Embedding
How to cite this article:

Wang Li, Gang Luo and Lingyun Xiang, 2014. An Automatically Changing Feature Method based on Chaotic Encryption. Information Technology Journal, 13: 2404-2410.

DOI: 10.3923/itj.2014.2404.2410






Curve Bottom