2021
DOI: 10.11591/ijeecs.v21.i3.pp1692-1703
|View full text |Cite
|
Sign up to set email alerts
|

Secure image hiding in speech signal by steganography-mining and encryption

Abstract: <span>Information hiding techniques are constantly evolving due to the increased need for security and confidentiality. This paper proposes a working mechanism in three phases. The first phase includes scrambling the values of the gray image depending on a series of keys that are generated using a quantum chaotic map. The second phase generates hybrid keys by mixing a Zaslavsky and a 3D Hanon map that are used to encrypt the gray image values produced after the scramble. Finally, in the third phase, a ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 23 publications
1
6
0
Order By: Relevance
“…Table 6 presents the PSNR values calculated on the reference images tested by our algorithm. The obtained values by our algorithm are within the standards, ensuring that our encryption algorithm is better than that of references [31], [36]. This confirm that our system is robust against differential attacks.…”
Section: Psnr Metric Analysissupporting
confidence: 75%
“…Table 6 presents the PSNR values calculated on the reference images tested by our algorithm. The obtained values by our algorithm are within the standards, ensuring that our encryption algorithm is better than that of references [31], [36]. This confirm that our system is robust against differential attacks.…”
Section: Psnr Metric Analysissupporting
confidence: 75%
“…The statistical measures used to assess the performance of the system in the encryption and decryption processes included (SNR, SNRseg, fwSNRseg, CC, LLR) [25], [26], [27], the statistical measures in compression used included (CR, SNR, SSSNR, PSNR, MSE). The equations of these measures were [2], [9], [10], [28]…”
Section: Resultsmentioning
confidence: 99%
“…Before the file is encrypted it is called plaintext, after it is encrypted it is called ciphertext [5]. While steganography [6], [7] is the science and [5]art of hiding secret messages where messages are contained in the media but their whereabouts are unknown to the human senses. In this case, it is necessary to create a file security system so that the files sent can be kept confidential.…”
Section: Introductionmentioning
confidence: 99%