Efficient three layer secured adaptive video steganography method using chaotic dynamic systems DOI Creative Commons
Dhanesh Kumar,

V. K. Sudha,

N. Manikandan

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Aug. 7, 2024

In light of the unprecedented growth in internet usage, safeguarding data from unauthorized access has emerged as a paramount concern. Cryptography and steganography stand pivotal methods for ensuring security during transmission. This study introduces an innovative adaptive video approach featuring three tiers extracting concealed information, thereby facilitating secure communication. The embedding process operates within spatial domain cover frames, enabling remarkable hiding ratio up to 28.125% (equivalent 2.25 bits per pixel payload) without compromising quality frames. Users are afforded flexibility select between partial or full capacity C

Language: Английский

Chaos-based approaches to digital data security: Analysis of incommensurate fractional-order Arneodo chaotic system and engineering application on Nvidia Jetson AGX Orin DOI
Akif Akgül, Mustafa YAZ, Berkay Emi̇n

et al.

Integration, Journal Year: 2025, Volume and Issue: unknown, P. 102355 - 102355

Published: Jan. 1, 2025

Language: Английский

Citations

3

A novel image gravity transform based on least significant bit in image steganography DOI

Mohsen Nikpour,

Mohammad Taghi Kheirabadi, Ali Nodehi

et al.

Mathematics and Computers in Simulation, Journal Year: 2025, Volume and Issue: unknown

Published: March 1, 2025

Language: Английский

Citations

0

RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System DOI Creative Commons
Yanpeng Zhang,

Jian Zeng,

Wenhao Yan

et al.

Entropy, Journal Year: 2024, Volume and Issue: 26(10), P. 855 - 855

Published: Oct. 10, 2024

In the past two decades, research in field of chaotic synchronization has attracted extensive attention from scholars, and at same time, more methods, such as master-slave synchronization, projection sliding film fractional-order so on, have been proposed applied to secure communication. this paper, based on radial basis function neural network theory particle swarm optimisation algorithm, RBFNN-PSO synchronisation method is for Sprott B system with external noise. The RBFNN controller constructed, its parameters are used parameters, optimal values obtained by PSO training method, which overcomes influence noise achieves system. Then, it shown numerical simulation analysis that scheme a good performance against Because multiple attractors richer dynamics, chaos image encryption particular, Zigzag disambiguation top corner rotation RGB channel selection proposed, sequences diffused disambiguated data streams, respectively. Therefore, decryption transmission implemented results given, random distribution characteristics encrypted images analysed using histogram Shannon entropy final achieve expected results.

Language: Английский

Citations

2

Image Steganography Technique based on Lorenz Chaotic System and Bloom Filter DOI Creative Commons

Ahmad Salim,

Khitam Abdulbasit Mohammed,

Farah Maath Jasem

et al.

International Journal of Computing and Digital Systems, Journal Year: 2024, Volume and Issue: 15(1), P. 851 - 859

Published: May 14, 2024

Steganography is the study of invisible communication, which typically focuses on methods concealing existence communicated message.Steganography now widely used as a means protecting sensitive data.The term "security" in steganography systems mainly implies to idea "undetectability", that is, how effective steganographic method for hiding data terms its capability avoid detection through statistical analysis and remain undiscovered even if cover media found by an unauthorized party.There are many techniques systems, one most common Least Significant Bit (LSB) technique.In this approach, some right-most bits image replaced with be hidden.Due computations simlicity it extremely susceptible attacks remains challenge.The proposed technique utilizes chaotic generate pseudo-random positions within images.By leveraging Lorenz's system Bloom filter, aims enhance information security preventing repetition loss same pixel.The approach overcomes vulnerabilities traditional LSB embedding encrypted arbitrary locations, making more secure against steganalysis.Results demonstrate method's effectiveness visual analytical attacks, PSNR 48.57% NPCR 32.35%.This innovative offers robust solution securely images, contributing advancement digital systems.

Language: Английский

Citations

1

Efficient three layer secured adaptive video steganography method using chaotic dynamic systems DOI Creative Commons
Dhanesh Kumar,

V. K. Sudha,

N. Manikandan

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Aug. 7, 2024

In light of the unprecedented growth in internet usage, safeguarding data from unauthorized access has emerged as a paramount concern. Cryptography and steganography stand pivotal methods for ensuring security during transmission. This study introduces an innovative adaptive video approach featuring three tiers extracting concealed information, thereby facilitating secure communication. The embedding process operates within spatial domain cover frames, enabling remarkable hiding ratio up to 28.125% (equivalent 2.25 bits per pixel payload) without compromising quality frames. Users are afforded flexibility select between partial or full capacity C

Language: Английский

Citations

1