0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
Authors :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
Keywords :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
Abstract :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
Papers List
List of archived papers
خوشه بندی مقید داده ها به کمک اتوماتای یادگیر سلولی
شکوفه علی محمدی - احمدعلی آبین
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
Aligning the Brick and Mortar cosmetic with digital transformation as the right way to overhaul the In-store Experience
Mehrgan Malekpour - Dr Federica Caboni
Face Recognition Based on Local Statistical Features and Artificial Neural Network
Mehdi Moghimi - Dr Hadi Grailu
Improving Deep Neural Network Accelerator for Malaria Diseased Blood Cells using FPGA
Hadi Rezaeikarjani - Mojtaba Valinataj
Improving Drug-Target Interaction Prediction Using Enhanced Feature Selection
Maryam Taheri - Mohammad Reza Keyvanpour - Mohadeseh Saadat Mousavi
Inner and Outer Bearing Fault Diagnosis of electrical Motors Using a Proposed Algorithm and Vibration Signals
Vahid Safari Dehnavi - Masoud Shafiee
User Preferences Elicitation in Bilateral Automated Negotiation Using Recursive Least Square Estimation
Farnaz Salmanian - Dr Hamid Jazayeri - Dr Javad Kazemitabar
Predictive Maintenance using LSTM and Adaptive Windowing
Aien Ghanbari Adivi - Behrouz Shahgholi Ghahfarokhi
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
more
Samin Hamayesh - Version 42.5.2