Next Article in Journal
Efficiencies and Work Losses for Cycles Interacting with Reservoirs of Apparent Negative Temperatures
Previous Article in Journal
Entropy Generation Optimization in Squeezing Magnetohydrodynamics Flow of Casson Nanofluid with Viscous Dissipation and Joule Heating Effect
Previous Article in Special Issue
Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain
Open AccessArticle

Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors

1
LASTRE Laboratory, Lebanese University, 210 Tripoli, Lebanon
2
Institut d’Electronique et des Télécommunications de Rennes (IETR), UMR CNRS 6164, Université de Nantes—Polytech Nantes, Rue Christian Pauc CS 50609, CEDEX 3, 44306 Nantes, France
3
School of Electronics and Telecommunications, Hanoi University of Science and Technology, 1 Dai Co Viet, Hai Ba Trung, Hanoi, Vietnam
4
INSA de Rennes, CNRS, IETR, CEDEX 7, 35708 Rennes, France
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(8), 748; https://doi.org/10.3390/e21080748
Received: 27 June 2019 / Revised: 21 July 2019 / Accepted: 24 July 2019 / Published: 30 July 2019
(This article belongs to the Special Issue Entropy Based Data Hiding)
  |  
PDF [3919 KB, uploaded 5 August 2019]
  |     |  

Abstract

In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size. View Full-Text
Keywords: steganography; chaotic system; steganalysis; wavelet; feature vector; SVM; FLD steganography; chaotic system; steganalysis; wavelet; feature vector; SVM; FLD
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Battikh, D.; El Assad, S.; Hoang, T.M.; Bakhache, B.; Deforges, O.; Khalil, M. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors. Entropy 2019, 21, 748.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top