0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A method for image steganography based on chaotic maps and advanced compression algorithms
نویسندگان :
Mohammad Yousefi Sorkhi
1
1- shahid beheshti university
کلمات کلیدی :
Image Steganography،Chaotic Maps،Data Compression،Information Security،Structural Similarity Index - SSIM
چکیده :
In this article, we present a new method for text steganography in images using chaotic maps and advanced compression algorithms. Our method employs the hybrid tent map to generate chaotic sequences, enhancing security and complexity in the steganography process. For data compression, we utilize a combination of Burrows-Wheeler Transform (BWT), Move-To-Front (MTF) coding, and arithmetic coding, which reduces data size and improves efficiency. Evaluation using 10 images from the USC-SIPI Image Database, based on PSNR, MSE, SSIM, and BER metrics, showed our method achieving an average PSNR of 40.19 dB, MSE of 0.0018, SSIM of 0.975, and BER of 0.0016, outperforming three other methods. These results demonstrate higher image quality, better preservation of original structures, and greater accuracy in text retrieval, indicating our method's high security and efficiency for text steganography in images.
لیست مقالات
لیست مقالات بایگانی شده
Automatic identification and reconstruction of Tuberculosis in microscopic images using convolutional auto-encoder network
Ahmad Reza Nadafi - Farahnaz Mohanna
A Swarm Intelligence Approach to Design Optimal Repeaters in Multilayer Graphene Nanoribbon Interconnects
Majid Sanaeepur - Maryam Momeni
Exploring the Relationship Between Gameplay Log Data and Depression & Anxiety
Soroush Elyasi - Arya Varasteh Nezhad - Fattaneh Taghiyareh
Paths-oriented Test Data Generation using Genetic Algorithm
Mohammad Reza Hassanpour Charmchi - Dr Bagher Rahimpour cami
A Mathematical Optimization Approach for Preference Learning in Movie Recommender Systems with Shared Accounts
Milad Khademali - Fazlollah Aghamohammadi - Marjan Kaedi - Alireza Nasiri
Improving Deep Neural Network Accelerator for Malaria Diseased Blood Cells using FPGA
Hadi Rezaeikarjani - Mojtaba Valinataj
مکانیابی خطاهای کاربردها و خدمات نرمافزاری با کمک تولید داده آزمون با نامتغیرهای محتمل
محمد نصرتی مقدم - حسن حقیقی - مجتبی وحیدی اصل
بررسی کارآمدی فناوری وب 0.2 در پشتیبانی از فرآیندهای انسان محور و دانش مبنا
سید احسان ملیحی - فاطمه مشایخی کردکلا
Violence detection using one-dimensional convolutional networks
Narges Honarjoo - Ali Abdari - Dr Azadeh Mansouri
A method for image steganography based on chaotic maps and advanced compression algorithms
Mohammad Yousefi Sorkhi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 41.3.1