2018
DOI: 10.1016/j.compeleceng.2018.02.022
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic system-based secure data hiding scheme with high embedding capacity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Keeping this in mind several schemes based on secret keys have been proposed in recent years [16]. Recently, Yadav and Ojha [17] proposed a more efficient scheme to embed the secret data into random locations of the image through chaotic systems for security, which provides a higher payload and imperceptibility.…”
Section: Introductionmentioning
confidence: 99%
“…Keeping this in mind several schemes based on secret keys have been proposed in recent years [16]. Recently, Yadav and Ojha [17] proposed a more efficient scheme to embed the secret data into random locations of the image through chaotic systems for security, which provides a higher payload and imperceptibility.…”
Section: Introductionmentioning
confidence: 99%
“…According to (5), we generated a series of discrete chaotic sequences with different computational precision, including = 8, 12, 16, and 24. In order to test the effect of computation precision on discrete chaotic sequences, we performed autocorrelation test, permutation entropy test, and statistical analysis of sequence periodicity for the above chaotic sequences.…”
Section: Influence Of Computational Precision Onmentioning
confidence: 99%
“…Therefore, in recent years, chaos theory has been widely applied in the field of cryptography and secret communication [1][2][3][4]. For instance, Yadav et al [5] proposed a chaotic system-based data hiding scheme that provides high payload and imperceptibility. Murillo-Escobar et al [6] put forward a novel pseudorandom number generator based on pseudorandomly enhanced Logistic map.…”
Section: Introductionmentioning
confidence: 99%
“…The success of steganography lies in transmission of stego objects without suspicion [1]. A large number of image steganographic techniques have appeared in the literature, for example [2][3][4][5][6][7]. These techniques can be classified into two main classes: spatial domain and transform domain techniques.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques can be classified into two main classes: spatial domain and transform domain techniques. In spatial domain techniques, private message is embedded in the intensity of image pixels directly [2][3][4]. In transform domain techniques, the private message is embedded in the cover by modifying coefficients in a transform domain such as discrete cosine transform (DCT) and integer discrete wavelet transform [5][6].…”
Section: Introductionmentioning
confidence: 99%