0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
نویسندگان :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
کلمات کلیدی :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
چکیده :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
لیست مقالات
لیست مقالات بایگانی شده
دستهبندی متون خبری فارسی با یادگیری فعال
مینا طباطبائی - دکتر سعیده ممتازی
Enhancing kNN-Based Intrusion Detection with Differential Evolution with Auto-Enhanced Population Diversity
Zohre Karimi - Zeinab Torabi
A New Routing Protocol in Internet of Vehicles Inspired of Spread Model of the Covid-19 Virus
Taha Yasin Rezapour - Esmaeil Zeinali - Reza Ebrahimi Atani - Mohammad Mehdi Gilanian Sadeghi
Improving Fog Computing Scalability in Software Defined Network using Critical Requests Prediction in IoT
Hajar Ghanbari
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
Predicting Suicide Risk in Adolescents with Random Forest for Unbalanced Data Management
Fatemeh Rabbani - Dr Behrooz Masoumi - Dr Mohammad Reza Keyvanpour
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
Wireless Virtual-Reality by considering Hybrid Beamforming in IEEE802.11ay standard
Nasim Alikhani - Abbas Mohammadi
طراحی و کنترل تطبیقی اورتز رباتیک پایین تنه با استفاده کنترلر منطقی قابل برنامه ریزی و رابط انسان با ماشین
فرهاد عظیمی فر - ستایش کرمی - نیایش امینی
بکارگیری الگوریتم بهینه سازی فاخته و منطق فازی به منظور بهبود زمانبندی وظایف در محیط محاسبات مه
فاطمه دوامی - حمید جلیلوند - فاطمه نجفی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2