Steganographic Cryptosystem Based on the Use of Chaos Theory and Cellular Automata
Abstract
The exchange of large amounts of information through public channels has become an everyday occurrence, a situation that generates great risks in the case of possible cyber-attacks and motivates the academic and scientific community to develop new robust security schemes. The objective of the research was to use mathematical and artificial intelligence tools to propose new security schemes. The design and implementation of a crypto-steganographic algorithm for text is described below. The methodology employed consisted of using cellular automata to detect the edges of a carrier image, leveraging the color contrast diversity, and the Tinkerbell chaotic attractor to generate two pseudo-random sequences: one for the encryption scheme and the other to select the edge pixels of the carrier image where cryptogram bits are hidden. Additionally, a verification phase was included in which the receiver provides a code to confirm that the stegoimage was not altered. The system key is shared between the sender and the receiver using the Diffie-Hellman algorithm. The proposed algorithm was subjected to a series of steganographic and cryptographic performance tests, including entropy analysis, mean square error (MSE), correlation coefficients, key sensitivity, peak signal-to-noise ratio (PSNR), normalized root mean square error (NRMSE), and the structural similarity index (SSI). The results of PSNR, MSE and SSI test were compared with scientific benchmarks, revealing indicators that align with the standards of information security. Finally, a crypto-steganographic algorithm was consolidated as a result of an academic exercise whose indicators make it potentially applicable in real-world contexts.
References
United Nation, “International Telecomunication Union,” sdgs.un.org. Accessed: Jun. 5, 2024. [Online]. Available: https://sdgs.un.org/un-system-sdg-implementation/international-telecommunication-union-itu-54247
C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, Oct. 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
C. E. Shannon, “A Mathematical Theory of Communication,” Bell Labs Technical Journal, vol. 27, no. 3, pp. 379-423, Jul. 1948. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
J. Von Neumann, “First draft of a report on the EDVAC,” in IEEE Annals of the History of Computing, vol. 15, no. 4, pp. 27-75, Dec. 1993. https://doi.org/10.1109/85.238389
S. Singh, The Code Book: The Secrets Behind Codebreaking, New York, NY, USA: Penguin random, 2002. https://www.penguinrandomhouse.com/books/168003/the-code-book-the-secrets-behind-codebreaking-by-simon-singh/9780375890123/
K M. M. de Leeuw, and J. Bergstra, Eds, “Computer Security” in The history of Information Security: A comprehensive handbook. Londres, Inglaterra: Elsevier Science, 2007. https://shop.elsevier.com/books/the-history-of-information-security/de-leeuw/978-0-444-51608-4
Y. Yu, “Preface to special topic on lattice-based cryptography,” National Science Review, vol. 8, no. 9, Sep. 2021. https://doi.org/10.1093/nsr/nwab154
M. J. Lucena López, Criptografía y Seguridad en Computadores, Jaen: Universidad de Jaén, 2022. https://ccia.esei.uvigo.es/docencia/SSI/cripto.pdf
A. Yaghouti Niyat, and M. H. Moattar, “Color image encryption based on hybrid chaotic system and DNA sequences,” Multimedia Tools and Applications, vol. 79, p. 1497–1518, Jan. 2020. https://doi.org/10.1007/s11042-019-08247-z
M. M. Savchuk, and A. V. Fesenko, “Quantum Computing: Survey and Analysis,” Cybernetics and Systems Analysis, vol. 55, pp. 10-21, Jan. 2019. https://doi.org/10.1007/s10559-019-00107-w
L. M. Cortés Martinez, L. D. Alvarado Nieto, and E. I. Amaya Barrera, “Composite cellular automata based encryption method applied to surveillance videos,” Dyna (Medellin), vol. 87, no. 213, pp. 212–221, Apr. 2020. https://doi.org/10.15446/dyna.v87n213.81859
M. Hussain, A. W. Abdul Wahab, Y. I. Bin Idris, A. T. S. Ho, and J. Ki-Hyun, “Image steganography in spatial domain: A survey,” Signal Processing: Image Communication, vol. 65, pp. 46-66, Jul. 2018. https://doi.org/10.1016/j.image.2018.03.012
D. R. I. M. Setiadi, “Improved payload capacity in LSB image steganography uses dilated hybrid edge detection,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 2, pp. 104-114, Feb. 2022. https://doi.org/10.1016/j.jksuci.2019.12.007
B. Stoyanov, and K. Kordov, “Novel secure pseudo-random number generation scheme based on two Tinkerbell maps,” Adv. Stud. Theor. Phys., vol. 9, no. 9, pp. 411–421, 2015. https://www.m-hikari.com/astp/astp2015/astp9-12-2015/p/stoyanovASTP9-12-2015.pdf
F. Y. Shih, Digital Watermarking and Steganography, Boca Ratón: CRC Press, 2017. https://doi.org/10.1201/9781315121109
M. Hassaballah, Digital media steganography: Principles, algorithms, and advances. San Diego, CA, Estados Unidos de América: Academic Press, 2020. https://doi.org/10.1016/C2018-0-04865-3
V. Lyubashevsky, “Lattice-based digital signatures,” National Science Review, vol. 8, no. 9, Sep. 2021. https://doi.org/10.1093/nsr/nwab077
R. S. Phadte, and R. Dhanaraj, “Enhanced blend of image steganography and cryptography,” in 2017 International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2017, pp. 230-235. https://doi.org/10.1109/ICCMC.2017.8282682
T. Saha, S. Sengupta and T. Dasgupta, “Chaotic cipher based spatial domain steganography with strong resistance against statistical attacks,” in 2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, India, 2017, pp. 365-370. https://doi.org/10.1109/ICRCICN.2017.8234536
A. Flores-Vergara et al., “Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic,” Nonlinear Dyn., vol. 96, no. 1, pp. 497–516, 2019. https://doi.org/10.1007/s11071-019-04802-3
I. Cherkaoui, and F. Zinoun, “On the use of Egyptian fractions for stream ciphers,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 26, no. 1, pp. 139-152, Nov. 2021. https://doi.org/10.1080/09720529.2021.1923921
Y. Satria, M. T. Suryadi and D. J. Cahyadi, “Digital text and digital image encryption and steganography method based on SIYu map and least significant bit,” Journal of Physics Conference Series, vol. 1821, no. 1, p. 012035, Mar. 2021. https://doi.org/10.1088/1742-6596/1821/1/012035
S. Kumar, P. K. Srivastava, G. K. Srivastava, P. Singhal, D. Singh, and D. Goyal, “Chaos based image encryption security in cloud computing,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 4, pp. 1041-1051, Jun. 2022. https://doi.org/10.1080/09720529.2022.2075085
H. El Bourakkadi, A. Chemlal, H. Tabti, M. Kattass, A. Jarjar, and A. Benazzi, “Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images,” International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 2684-2694, Jun. 2024. https://doi.org/10.11591/ijece.v14i3
J. Mohammed and D. R. Nayak, “An efficient edge detection technique by two dimensional rectangular cellular automata,” in International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India, 2014, pp. 1-4. https://doi.org/10.1109/ICICES.2014.7033847
S. Kumar, A. Singh, and M. Kumar, “Information hiding with adaptive steganography based on novel fuzzy edge identification,” Defence Technology, vol. 15, no. 2, pp. 162-169, Apr. 2019. https://doi.org/10.1016/j.dt.2018.08.003
B. Lakshmi Sirisha, and B. Chandra Mohan, “Review on spatial domain image steganography techniques,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, no. 6, pp. 1873-1883, Sep. 2021. https://doi.org/10.1080/09720529.2021.1962025
S. Amrogowicz, Y. Zhao, and Y. Zhao, “An edge detection method using outer Totalistic Cellular Automata,” Neurocomputing, vol. 214, pp. 643-653, Nov. 2016. https://doi.org/10.1016/j.neucom.2016.05.092
A. Kumar, and S. K. Sharma, “Information cryptography using cellular automata and digital image processing,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 4, pp. 1105-1111, 2022. https://doi.org/10.1080/09720529.2022.2072437
N. Kar, K. Mandal and B. Bhattacharya, “Improved chaos-based video steganography using DNA alphabets,” ICT Express, vol. 4, no. 1, pp. 6-13, Mar. 2018. https://doi.org/10.1016/j.icte.2018.01.003
M. Arias Cárdenas, “Criptosistema Esteganográfico a través de Imágenes Digitales para el Cifrado de Texto Usando Teoría del Caos y Autómatas Celulares,” Tesis de grado, Universidad Distrital Francisco José de Caldas, Bogotá, 2020. https://repository.udistrital.edu.co/items/a34dbf52-d2c1-40f9-a1dc-a6d9ec463ab4
OpenSSL Corporation, “OpenSSL Cryptography and SSL/TLS Toolkit,” openssl.org. Accessed: [Online]. Available: https://www.openssl.org/. https://www.openssl.org/
W. Diffie, and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976. https://doi.org/10.1109/TIT.1976.1055638
G. Van Rossum. Python Software. V3.13, (2024). Centrum Wiskunde & Informatica (CWI). Netherlands. [Online]. Available: http://www.Python.org
S. Yuan, T. Jiang, and Z. Jing, “Bifurcation and Chaos in the Tinkerbell Map,” International Journal of Bifurcation and Chaos, vol. 21, no. 11, pp. 3137-3156, 2011. https://doi.org/10.1142/S0218127411030581
USC Viterbi School of Engineering, “Signal and Image Processing Institute,” sipi.usc.edu. Accessed: Jun. 5, 2009. [Online]. Available: https://sipi.usc.edu/database/database.php
L. Pardo LLorente, “Teoría de la información estadística,” Estadística Española, vol. 35, no. 133, pp. 195-268, 1993. https://ine.es/ss/Satellite?blobcol=urldata&blobheader=application%2Fpdf&blobheadername1=Content-Disposition&blobheadervalue1=attachment%3B+filename%3D133_1.pdf&blobkey=urldata&blobtable=MungoBlobs&blobwhere=583%2F542%2F133_1%2C0.pdf&ssbinary=true
A. Saha, N. Manna, and S. Mandal, “India,” in Information theory, coding and cryptography: Pearson Education, 2013. https://books.google.com.co/books/about/Information_Theory_Coding_and_Cryptograp.html?id=iUI8BAAAQBAJ&redir_esc=y
Downloads
Copyright (c) 2024 TecnoLógicas

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
| Article metrics | |
|---|---|
| Abstract views | |
| Galley vies | |
| PDF Views | |
| HTML views | |
| Other views | |





















