Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer

Abstract

One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main aim of this study is to enhance the security level of the online data transfer using two integrated methods; images steganography to hide the transfer data in image media, and chaotic map to remap the original format of the transfer data. The integration between these two methods is effective to secure the data in several format such as text, audio, and images. The proposed algorithm is the prototyped using JAVA programming, 20 images and text messages of usable sizes (plain data) were tested on the dataset using the developed programming. The simulation using local server is accomplished to analyze the security performance based on two factors; the plain data size and the data transfer distance. Many attacking attempts are performed on the simulation test using known attacking techniques such as observe the stego images quality. The experiment results show that about 85% of the attacking attempts fail to catch the stego images. 95% of the attacks fail in remap meaningful parts of the chaotic data. The results indicate the very good level of the propose security methods to secure the online transfer data. The contribution of this study is the effective integration between the steganography and chaotic map approaches to assure high security level of online data transfer.

Authors and Affiliations

Yasser Mohammad Al-Sharo

Keywords

Related Articles

Usability of “Traysi”: A Web Application for Tricycle Commuters

This study measured the usability of a web application for tricycle commuters that was developed using Hypertext Markup Language (HTML), Cascading Style Sheet (CSS) and Javascript (JS) with the aid of Google Artificial P...

Classification of Hand Movements based on Discrete Wavelet Transform and Enhanced Feature Extraction

Extraction of potential electromyography (EMG) features has become one of the important roles in EMG pattern recognition. In this paper, two EMG features, namely, enhanced wavelength (EWL) and enhanced mean absolute valu...

A Web Mining Approach for Personalized E-Learning System

The Web Mining plays a very important role for the E-learning systems. In personalized E-Learning system, user customize the learning environment based on personal choices. In a general search process ,a hyperlink which...

Knowledge Management Strategyfor SMEs

In Thailand, as in other developing countries, the focus was on the large industry first, since governments assumed that large enterprises could generate more employment. However, there has been a realization that the SM...

EDAC: A Novel Energy-Aware Clustering Algorithm for Wireless Sensor Networks

Clustering is a useful technique for reducing energy consumption in wireless sensor networks (WSN). To achieve a better network lifetime performance, different clustering algorithms use various parameters for cluster hea...

Download PDF file
  • EP ID EP550295
  • DOI 10.14569/IJACSA.2019.0100430
  • Views 72
  • Downloads 0

How To Cite

Yasser Mohammad Al-Sharo (2019). Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer. International Journal of Advanced Computer Science & Applications, 10(4), 252-258. https://europub.co.uk/articles/-A-550295