An Efficient Steganography Scheme Based on Chaos Encryption

Helen Bethzia*, Ashok Kumar**
* PG Scholar, Chandy College of Engineering, Tuticorin, Tamilnadu, India.
** Assistant Professor, Department of ECE, Chandy College of Engineering, Tuticorin, Tamilnadu, India.
Periodicity:April - June'2014
DOI : https://doi.org/10.26634/jdp.2.2.2864

Abstract

Cryptography and Steganography are the two techniques used for secure transmission. Here, chaos encryption is used to encrypt the confidential text data onto unreadable forms. After data encryption, the data hider will conceal secret data into the ElectroCardioGram (ECG) signal using Adaptive Pixel Pair Matching (APPM). In the data extraction module, the secret data will be extracted from Steganographic ECG signal using shared secret key. To measure Steganography ECG signal effectiveness Minimum Mean Square Error (MMSE) and Root Mean Square Error (RMSE) be used. Finally the performance of encryption and data hiding will be analyzed based on ECG signal and data recovery. Finally the performance will be analyzed based on ECG signal and data recovery. This technique grand minimum distortion with high security protection and ECG data should be diagnosable after the data can be recovered.

Keywords

ECG, Chaos encryption, Adaptive Pixel Pair Matching, Steganography.

How to Cite this Article?

Bethzia,H.S., and Kumar,A.M. (2014). An Efficient Steganography Scheme Based On Chaos Encryption. i-manager’s Journal on Digital Signal Processing, 2(2),22-26. https://doi.org/10.26634/jdp.2.2.2864

References

[1]. A. Al-Fahoum, (2006). “Quality assessment of ECG compression techniquesusing a wavelet-based diagnostic measure,” IEEE Transactions on Information Technology in Biomedicine, Vol. 10, No. 1.
[2]. Ayman Ibaida, Ibrahim Khalil, (2013). “Wavelet based ECG steganography for protection patient confidential information in Point of Care Systems”, in IEEE Transactions on Biomedical Engineering, Vol. 60, No .12, pp.3322-3330.
[3]. H.Golpira and H. Danyali, (2010). “Reversible blind watermarking for medical images based on wavelet histogram shifting,” in IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2009. IEEE, pp. 31–36.
[4]. F,Hu, M.Jiang, M.Wagner, and D.Dong, (2007). “Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign,” IEEE Transactions on Information Technology in Biomedicine, Vol. 11, No. 6, pp. 619–627.
[5]. Y.Lin, I. Jan, P.Ko, Y.Chen, J.Wong, and G,Jan, (2004). “A wireless PDA-based physiological monitoring system for patient transport,” IEEE Transactions on Information Technology in Biomedicine, Vol. 8, No. 4,pp. 439–447.
[6]. L.Marvel, C.Boncelet, and C.Retter, (1999). “Spread spectrum image Steganography,” IEEE Transactions on Image Processing, Vol. 8, No. 8,pp. 1075–1083.
[7]. Sudhir Keshari and S. G. Modani, (2011). “Image Encryption Algorithm based on Chaotic Map Lattice and Arnold cat map for Secure Transmission” International Journal of Computer Science and Technology, Vol. 2, Issue 1, pp. 132–135.
[8]. K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K., (2004). “Murali, Chaos Based Spread Spectrum Image Steganography,” IEEE Transactions on Consumer 588 Electronics, Vol. 50, No. 2, pp. 987–990.
[9]. Wien Hong and Tung-Shou Chen. “A Novel Data Embedding Method Using AdaptivePixel Pair Matching”, in IEEE Transactions on Engineering, Vol.7, No .1, pp.176-184, 20
[10]. K.Zheng and X.Qian, (2008). “Reversible Data Hiding for ElectrocardiogramSignal Based on Wavelet Transforms,” in International Conference on Computational Intelligence and Security, 2008. CIS'08, Vol. 1.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.