0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
نویسندگان :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
کلمات کلیدی :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
چکیده :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
لیست مقالات
لیست مقالات بایگانی شده
ISPREC: Integrated Scientific Paper Recommendation using heterogeneous information network
Elaheh Jafari - Dr Bita Shams - Dr Saman Haratizadeh
استفاده از هوش مصنوعی در فضای آموزش عالی: آن روی سکه
محمدمتین لیث صفار - عسل آغاز
StockFM: پیش بینی قیمت بازار بورس ایران به کمک مدل بنیادین سری زمانی
فاطمه چیت ساز - سامان هراتی زاده
An efficient hybrid approach for performance-based alternative design evaluation in systems engineering
Abbas Chaman Para - Maryam Nooraei Abadeh - Sondos Bahadori
Explainable AI for Medical Image Diagnosis Using Hybrid Attention-CAM Mechanisms
Negin Amirzadeh
پیاده سازی سیستم پیش بیمارستانی یافت آمبولانس مناسب در محیط رایانش ابری با استفاده از شبیه ساز کلودسیم
ریحانه حسن رحیمی - فهیمه یزدان پناه
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Maryam Eslami - Dr Mehdi Sakhaei-nia
Prompt-Based Composed Fashion Image Retrieval via Gated Detail-Enhanced Dual Cross-Attention Difference Modeling
Kosar Keshavarz - Reza Azmi
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
Kalman Filter–Based Anomaly Detection for User Authentication Failures in Enterprise Logs
Somayeh Soltani - Hossein Nikdel
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2