0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
Authors :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
Keywords :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
Abstract :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
Papers List
List of archived papers
A Novel Decentralized Privacy Preserving Federated Learning Model for Healthcare Applications
Saba Ameri - Reza Ebrahimi Atani
Sparse Beamforming Design for Non-Coherent UD-CRAN with mm-Wave Fronthaul Links
Alireza M. Hosseini - Dr Abbas Mohammadi
Evaluating LLMs in Persian News Summarization
Arya VarastehNezhad - Reza Tavasoli - Mostafa Masumi - Seyed Soroush Majd - Mehrnoush Shamsfard
A Deep Neural Network-based Method for MmWave Time-varying Channel Estimation
Amirhossein Molazadeh - Zahra Maroufi - Mehrdad Ardebilipour
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
جانمایی توزیعشده محتوا برای ذخیرهسازی موقت در شبکههای سلولی کوچک با حضور کاربران مخرب
زهرا رشیدی - دکتر وصال حکمی - حانیه سلمانطاهری زهرا رشیدی - وصال حکمی - حانیه سلمانطاهری -
Recommendation Systems in Smart Agriculture: Pathway to a well-designed system
Ahmad Nameni - Amir Ghafarian Daneshmand - Omid Mahdi Ebadati E
Enhancing kNN-Based Intrusion Detection with Differential Evolution with Auto-Enhanced Population Diversity
Zohre Karimi - Zeinab Torabi
ارائه یک مدل جهت تخصیص منابع به توابع مجازی شبکه (VNF) باهدف حفظ درجه تعادل بار در شبکه های چند دامنه ای مبتنی بر نرمافزار(multi-SDN)
امین زنداقطاعی - دکتر وحید ستاری نائینی امین زنداقطاعی - وحید ستاری نائینی -
Knowledge gap extraction based on the learner click behavior in interaction with videos using the association rule algorithm
Yosra Bahrani - Omid Fatemi
Samin Hamayesh - Version 40.3.1