0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
Authors :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
Keywords :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
Abstract :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
Papers List
List of archived papers
Paths-oriented Test Data Generation using Genetic Algorithm
Mohammad Reza Hassanpour Charmchi - Dr Bagher Rahimpour cami
Vi-Net: A Deep Violent Flow Network for Violence Detection in Video Sequences
Tahereh Zarrat Ehsan - Seyed Mehdi Mohtavipour
رویکردی در تشخیص خودکار بوهای بد در مدل های معماری سازمانی با استفاده از تحلیل گرافی
زهرا رحیمی تمندگانی - شهره آجودانیان
Design and Simulation of a New Multiplexer with Energy Analysis in Quantum Cellular Automata Technology
- - -
Knowledge gap extraction based on the learner click behavior in interaction with videos using the association rule algorithm
Yosra Bahrani - Omid Fatemi
Embedded speech encoder for low-resource languages
Alireza A.Tabatabaei - Pouria Sameti - Ali Bohlooli
یک سیستم پاسخ به نفوذ در شبکه های اینترنت اشیاء با استفاده از شبکه های مبتنی بر نرم افزار
احسان شاهرخی مینا - رضا محمدی - محمد نصیری
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
مدیریت توأم منابع و خواب ایستگاه پایه مبتنی بر یادگیری تقویتی در شبکه های فوق متراکم با ارتباطات دو طرفه
طاهره رحمتی - بهروز شاهقلی قهفرخی
A Comparative Evaluation of Machine Learning Models for Anomaly-Based IDS in IoT Networks
Seyed Amir Mousavi - Mostafa Sadeghi - Mohammad Sadeq Sirjani
Samin Hamayesh - Version 40.3.1