International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Textual Data Hiding in Digital Images Using Chaotic Maps

Author NameAuthor Details

Vipul Sharma, Roohie Naaz Mir

Vipul Sharma[1]

Roohie Naaz Mir[2]

[1]Research Scholar, Department of Computer Science & Engineering, National Institute of Technology, Srinagar, India

[2]Department of Computer Science & Engineering, National Institute of Technology, Srinagar, India


In this research paper another methodology for covering up literary information in computerized hued pictures has been proposed. Digital colored pictures will simply be used as a canopy media in steganography as a result of numerous deficiencies rumored in sensory system of mortals. In the proposed system we have utilized two non-subordinate disordered arrangement, for distinguishing the fundamental pixel positions where the bits relating to the mystery message must be inserted in the computerized cover picture. For implanting the message bits in the clamorously chosen pixels a 3-3-2 Least Significant Bit (LSB) addition strategy has been utilized. The proposed technique also provides a sufficient level of security because of the fact that same series of chaotically generated pixel locations for embedding the message bits is very difficult to be reproduced, till and unless the initial conditions of the 2 chaotic maps used for pixel selection method are well known. Additionally, the arranged method gives higher leads as far as PSNR (Peak Signal to noise ratio) and MSE (Mean squared error) values when contrasted, with optional existing strategies, subsequently guaranteeing that meddlers won't have any doubt that there is a message covered up inside the sent cover picture.

Index Terms





Chaotic Maps

Cover Image

Stego Image



  1. 1.
    William Stallings, (2003) Cryptography and Network Security, Principles & Practices, third edition, Pearson Education, Singapore.
  2. 2.
    B. Dunba. (2002). A detailed look at steganographic techniques and their use in an open system environment, Sans institute.
  3. 3.
    C. Christian. An Information Theoretic Model for Steganography, Proceedings of 2nd Workshop on information Hiding, MIT laboratory.
  4. 4.
    Jhonson, January 2002. Survey of Steganography Software, technical report.
  5. 5.
    Krenn, R. "Steganography and Steganalysis",
  6. 6.
    Dey, S., Abraham, A., Sanyal, S. (2007, August). An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on (pp. 101-108). IEEE.
  7. 7.
    Yu, L., Zhao, Y., Ni, R., Li, T. (2010). Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP Journal on Advances in Signal Processing, 2010, 32.
  8. 8.
    Liao, X., Wen, Q. Y., Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.
  9. 9.
    Kumar, A., Kumari, S., Patro, S., Sh, T., Acharya, A. K. Image Steganography using Index based Chaotic Mapping., IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT 2015(1):1-4, January 2015.
  10. 10.
    Zaghbani, S., Rhouma, R. (2013, April). Data hiding in spatial domain image using chaotic map. In Modeling, Simulation and Applied Optimization (ICMSAO), 2013 5th International Conference on (pp. 1-5). IEEE.
  11. 11.
    Anees, A., Siddiqui, A. M., Ahmed, J., Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
  12. 12.
    Ghebleh, M., Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.
  13. 13.
    Kanso, A. (2012). Steganographic algorithm based on a chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3287-3302.
  14. 14.
    Juneja, M., Sandhu, P. S. (2013). An improved LSB based steganography technique for RGB color images. International Journal of Computer and Communication Engineering, 2(4), 513.
  15. 15.
    Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22.
  16. 16.
    Dasgupta, K., Mandal, J. K., Dutta, P. (2012). Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), 1-11.
  17. 17.
    Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
  18. 18.
    Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4).
  19. 19.
    The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at:, last accessed in February 2016.
  20. 20.
    Zhou Wang and Alan C. Bovik (2009). Mean Squared Error: Love It or Leave It? A new look at signal fidelity measures. IEEE signal processing Magazine.
  21. 21.
  22. 22.
    Suchi Agarwal, Dr. Jaipal Singh Bhist (2016). Data hiding in digital image processing using cryptography and steganography. IRJET, vol. 03, issue: 05.
  23. 23.
    Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy. "Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps" International Journal of Computer Applications (0975 - 8887) Volume 138 - No.12, March 2016.
  24. 24.
    Vipul Sharma, Madhusudan (2015). "Two new approaches for image steganography using cryptography", 2015 Third international conference on image information processing (ICIIP), 2015.
  25. 25.
    Vipul Sharma, Sunny Kumar (2013). "A new approach to hide text in images using steganography". IJARCSSE (2013).
  26. 26.
    Hassan Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud. "Data hiding in a digital cover image using chaotic maps & LSB technique", 2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
  27. 27.
    Goel, Stuti, Arun Rana, and Manpreet Kaur. "ADCT-based Robust Methodology for Image Steganography", International Journal of Image Graphics and Signal Processing, 2013.
  28. 28.
    Sharif, Ami, Majid Mollaeefar, and Mahboubeh Nazari. "A novel method for digital image steganography based on a new three-dimensional chaotic map", Multimedia Tools & Applications, 2016.
  29. 29.
    J.K. Mandal, A. Khamrui. "A Genetic Algorithm based steganography in frequency domain (GASFD)", 2011 International Conference on Communication and Industrial Application, 2011.
  30. 30.
  31. 31.
    Abid Yahya. "Steanography Techniques for Digital Images", Springer Nature, 2019.
  32. 32.
    Nadeem Akhtar, Pragati Johri, Shahbaaz Khan. "Enhancing the Security and Quality of LSB Based Image Steganography", 2013 5th International Conference on Computational Intelligence and Communication Networks, 2013.
  33. 33.
    Reddy, Velagalapalli Lokeswara, Arige Subramanyam, and Pakanati CHenna Reddy. "A novel technique for JPEG image steganography and its performance evaluation", International Journal of Advanced Media and Communication, 2014.
  34. 34.
    Jiang, Nan, Na Zhao, and Luo Wang. "LSB Based Quantum Image Steganography Algorithm", International Journal of Theoretical Physics, 2015.
  35. 35.
    H. Nabaee, K.Faez. "An efficient steganography method based on reducing changes", 2010 25th International Conference of Image and Vision Computing New Zealand, 2010.
  36. 36.
    Shabir A. Parah, Javaid A. Sheikh, Abdul M. Hafiz, G.M. Bhat. "Data hiding in scrambled images: A new double layer security data hiding technique", Computers & Electrical Engineering, 2014.
  37. 37.
    Dadgostar, H., and F. Afsari. "Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB", Journal of Information Security and Applications, 2016.
  38. 38.
    Prabira Kumar Sethy, Kamal Pradhan, Santi Kumar Behera. "A security enhanced approach for video Steganography using K-Means clustering and direct mapping", 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
  39. 39.
    Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel. "Enhanced high capacity image steganography using discrete wavelet transform and the laplacian pyramid", Multimedia Tools & Applications, 2018.
  40. 40.
    Maheshwari, S.Uma, and D.Jude Hemanth. "Different methodology for image steganography-based data hiding: review paper", International Journal of Information and Communication technology, 2015.
  41. 41.
    Sajasi, Sara, and Amir-Masoud Eftekhari Moghadam. "An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method", Applied Soft Computing, 2015.
  42. 42.
    Vinsa Varghese. "A secure method for hiding data on cubism image using hybrid feature detection method", International Journal of Research in Engineering and Technology, 2014.
  43. 43.
    Omar Banimelhem, Lo'ai Tawalbeh, Moad Mowafi, Mohammed Al-Batati. "A more secure image hiding scheme using pixel adjustment and genetic algorithm", International Journal of Information Security and Privacy, 2013.
  44. 44.
    M.Ghebleh, A. Kanso. "A robust chaotic algorithm for digital image steganography", Communications in Nonlinear Science and Numerical Simulation, 2014
  45. 45.
    "Intelligent Systems Design and Applications", Springer Nature, 2018
  46. 46.
    Dogan, Sengul. "A new data hiding method based on chaos embedded genetic algorithm for color image", Artificial Intelligence Review, 2016.
  47. 47.
    Advances in Intelligent Systems and Computing, 2016.
  48. 48.
    Sarosh K. Dastoor. "Comparative Analysis of Steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices", 2011 World Congress on Information and Communication Technologies, 2011.