2016
DOI: 10.1016/j.compeleceng.2015.12.005
|View full text |Cite
|
Sign up to set email alerts
|

A steganographic method using Bernoulli’s chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…But once the embedding algorithm is revealed for the stego image, any malicious individual could extract the secret information easily, so encrypting the secret data [15] is a necessary for their scheme. Keeping this in mind several schemes based on secret keys have been proposed in recent years [16]. Recently, Yadav and Ojha [17] proposed a more efficient scheme to embed the secret data into random locations of the image through chaotic systems for security, which provides a higher payload and imperceptibility.…”
Section: Introductionmentioning
confidence: 99%
“…But once the embedding algorithm is revealed for the stego image, any malicious individual could extract the secret information easily, so encrypting the secret data [15] is a necessary for their scheme. Keeping this in mind several schemes based on secret keys have been proposed in recent years [16]. Recently, Yadav and Ojha [17] proposed a more efficient scheme to embed the secret data into random locations of the image through chaotic systems for security, which provides a higher payload and imperceptibility.…”
Section: Introductionmentioning
confidence: 99%
“…Ghebleh and Kanso in 2014 proposed a method for embedding a binary message randomly in selected detail coefficients of the discrete wavelet transform of a cover image using a 3D chaotic cat map. The results showed that the proposed method has good imperceptibility and high sensitivity to the secret key [13]. Martnez-Gonzlez et al in 2015 proposed a method for hiding text in color images.…”
Section: Related Workmentioning
confidence: 96%
“…According to scientific literature, several authors [60,61,65] have proposed novel steganographic algorithms based on chaotic maps, which are nonlinear systems suitable to design secure embedding methods [48]. Indeed, these systems are characterized by a pseudo random behavior and an high sensitivity to initial conditions and control, unpredictability, ergodicity, etc [36].…”
Section: Generation Of Chaotic Positionsmentioning
confidence: 99%