Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer

Abstract

One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main aim of this study is to enhance the security level of the online data transfer using two integrated methods; images steganography to hide the transfer data in image media, and chaotic map to remap the original format of the transfer data. The integration between these two methods is effective to secure the data in several format such as text, audio, and images. The proposed algorithm is the prototyped using JAVA programming, 20 images and text messages of usable sizes (plain data) were tested on the dataset using the developed programming. The simulation using local server is accomplished to analyze the security performance based on two factors; the plain data size and the data transfer distance. Many attacking attempts are performed on the simulation test using known attacking techniques such as observe the stego images quality. The experiment results show that about 85% of the attacking attempts fail to catch the stego images. 95% of the attacks fail in remap meaningful parts of the chaotic data. The results indicate the very good level of the propose security methods to secure the online transfer data. The contribution of this study is the effective integration between the steganography and chaotic map approaches to assure high security level of online data transfer.

Authors and Affiliations

Yasser Mohammad Al-Sharo

Keywords

Related Articles

Empirical Analysis of Metrics Using UML Class Diagram

Lots of Organizations before they are setup survey the maintainability of programming frameworks. To give quality program design there exists a critical strategy called Object-Oriented Framework. Object–Oriented estimati...

Applicability of the Maturity Model for IT Service Outsourcing in Higher Education Institutions

Outsourcing is a strategic option which complements IT services provided internally in organizations. This study proposes the applicability of a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38...

Computer-based Approach to Detect Wrinkles and Suggest Facial Fillers

Modern medical practice has embraced facial filler injections as part of the innumerable cosmetic procedures that characterize the current age of medicine. This study proposed a novel methodological framework. The Incept...

Regularization Activation Function for Extreme Learning Machine

Extreme Learning Machine (ELM) algorithm based on single hidden layer feedforward neural networks has shown as the best time series prediction technique. Furthermore, the algorithm has a good generalization performance w...

Exploiting the Role of Hardware Prefetchers in Multicore Processors

The processor-memory speed gap referred to as memory wall, has become much wider in multi core processors due to a number of cores sharing the processor-memory interface. In addition to other cache optimization technique...

Download PDF file
  • EP ID EP550295
  • DOI 10.14569/IJACSA.2019.0100430
  • Views 79
  • Downloads 0

How To Cite

Yasser Mohammad Al-Sharo (2019). Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer. International Journal of Advanced Computer Science & Applications, 10(4), 252-258. https://europub.co.uk/articles/-A-550295