Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer and Automation Engineering, 4th (ICCAE 2012)
ISBN:
9780791859940
No. of Pages:
460
Publisher:
ASME Press
Publication date:
2012
eBook Chapter
36 Data Hiding Using Chaotic Function and Partitioned Image Histogram
By
R. Haghnazarkoochaksaraei
,
R. Haghnazarkoochaksaraei
Department of Computer Science, Science and Research Branch,
Islamic Azad University
, Khouzestan
-Iran
Search for other works by this author on:
V. Aghazarian
,
V. Aghazarian
Department of Computer Science, Central Tehran Branch,
Islamic Azad University
, Tehran
, Iran
Search for other works by this author on:
A. Haroonabadi
,
A. Haroonabadi
Department of Computer Science, Central Tehran Branch,
Islamic Azad University
, Tehran
, Iran
Search for other works by this author on:
A. Hedayati
A. Hedayati
Department of Computer Science, Central Tehran Branch,
Islamic Azad University
, Tehran
, Iran
Search for other works by this author on:
Page Count:
7
-
Published:2012
Citation
Haghnazarkoochaksaraei, R, Aghazarian, V, Haroonabadi, A, & Hedayati, A. "Data Hiding Using Chaotic Function and Partitioned Image Histogram." International Conference on Computer and Automation Engineering, 4th (ICCAE 2012). Ed. Zhou, J. ASME Press, 2012.
Download citation file:
In this paper, a new method is represented which utilizes the chaotic properties of chaos function and image histogram. Considering each pixel gray scale, the image in this method is partitioned into 16 sections. The histogram of each section is used for the determination of those pixels which are nominated for the encryption of code data bits. The chaos function is responsible for the selection of an appropriate order among pixels which are chosen at the previous stage.
High embedding capacity, high value obtained for the image PSNR, and resistance of the proposed method against brute-force attack are the characteristics that emphasize high effectiveness of this method.
Abstract
1 Introduction
2 Chaos Signals
3 The Proposed Method
4 Experimental Results
5 Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Rate-1∕2 Maximum Free Distance Convolutional Codes Complexity Analysis with Chaos-Encrypted Data
Intelligent Engineering Systems through Artificial Neural Networks Volume 18
Image Encryption and Scrambling Based on Chaos
International Conference on Computer and Computer Intelligence (ICCCI 2011)
Byte Permutations in Block Cipher Based on Immune Systems
International Conference on Software Technology and Engineering, 3rd (ICSTE 2011)
A New Chaos Based Image Encryption Algorithm
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Related Articles
A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing
J. Comput. Inf. Sci. Eng (August,2021)
On a Discrete Chaos Induction Via an Aperiodic Kicks Pattern
J. Comput. Nonlinear Dynam (July,2017)
Measures of Order in Dynamic Systems
J. Comput. Nonlinear Dynam (July,2008)