0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
Authors :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
Keywords :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
Abstract :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
Papers List
List of archived papers
پیشنهادات کالیبره شده براساس احساسات استخراج شده از متون مرتبط با آیتم ها
شیوا پارساراد - دکتر سامان هراتی زاده شیوا پارساراد - سامان هراتی زاده -
طراحی و کنترل تطبیقی اورتز رباتیک پایین تنه با استفاده کنترلر منطقی قابل برنامه ریزی و رابط انسان با ماشین
فرهاد عظیمی فر - ستایش کرمی - نیایش امینی
Electrophysiological Modeling and Interactive Approaches of Electrical Circuits and Hypergraphs for Understanding Neural Circuit Dynamics
Arian Baymani - Maryam Naderi Soorki
A Potential Solutions-Based Parallelized GA for Application Graph Mapping in Reconfigurable Hardware
Seyed Mehdi Mohtavipour - Hadi Shahriar Shahhoseini
Classification of Personality Traits on Facebook Using Key Phrase Extraction, Language Models and Machine Learning
Faezeh Safari - Abdolah Chalechale
A Community-Based Method for Identifying Influential Nodes using Network Embedding
Nargess Vafaei - Dr Mohammad Reza Keyvanpour
Identifying Children's Personality Styles through Drawing Analysis using Machine Learning
Maedeh Mosharraf - Faezeh Banabazi
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
Statistical distance-base acceptance strategy for desirable offers in bilateral automated negotiation
Arash Ebrahimnezhad - Dr Hamid Jazayeriy - Dr Faria Nassiri-mofakham
A New Method Based on Deep Learning and Time Stabilization of the Propagation Path for Fake News Detection
Fatemeh Torgheh - Dr Mohammad Reza Keyvanpour - Dr Behrooz Masoumi
more
Samin Hamayesh - Version 42.5.2