Giter Club home page Giter Club logo

two-tier-hybrid-steganography-approach-using-chaos-theory's Introduction

Two-Tier-Hybrid-Steganography-Approach-using-Chaos-Theory.

The proposed system is a 2 Tier Security System, in which first the messages is encoded in image and then the image is shuffled to provide a higher level of security of images. Eavesdrop cannot cryptanalysis the cipher image. Here, the security relies on a secret key along with the image encryption technique. Chaos is known for randomness, so it is highly secured. Confusion has been done by pixel movement form actual position to a new position and diffusion has been done through byte sequence generated through Henon map. So both the processes of increasing confusion and diffusion resulted in increasing the security of cryptosystem.

Built In

Jupyter Notebook

pip install jupyterlab

Methodology

First LSB method is used to hide data within image.
Then for encrypting image we have shuffled image's pixels using chaos theory, to create a noise image.
Chaotic systems are a simple sub-type of nonlinear dynamical systems. They may contain very few interacting parts and these may follow very simple rules, but these systems all have a very sensitive dependence on their initial conditions. Despite their deterministic simplicity, over time these systems can produce totally unpredictable and wildly divergent behavior.
There are various ways to implement Chaos Theory. We have used the Henon Map.
Given initial conditions (x0,y0), a henon map is given by the following equations:
(Xn+1) = (Yn) + 1 − a.(Xn)^2
(Yn+1) = b * (Xn)
Classical Henon map have values of a = 1.4 and b = 0.3. For the classical values the Henon map is chaotic. For other values of a and b the map may be chaotic, intermittent, or converge to a periodic orbit.
For more details, view Description.

Usage

from PIL import Image
import numpy as np
from matplotlib.pyplot import imshow
import cv2
%run ./ENCODE.ipynb # returns Encrypted Image
%run ./DECODE.ipynb # returns Message that is encrypted before.
%run ./Comparision.ipynb # compare orignal and fianl image on basis of pixel intensity.

INPUT

MESSAGE:

ENEMY MOVING WEST. ATTACK.

IMAGE:

OUTPUT

ENCODING:

DECODING:

COMPARISION(Pixel Intensity)

view COMPARISION.pynb
ORIGNAL IMAGE:

FINAL IMAGE:

Contributing

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

Please make sure to update tests as appropriate.

License

MAAK

two-tier-hybrid-steganography-approach-using-chaos-theory's People

Contributors

zvut avatar

Stargazers

 avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.