Steganographic Cryptosystem Based on the Use of Chaos Theory and Cellular Automata

Keywords: security, cellular automata, chaos, cryptography, image edge detection, steganography

Abstract

The exchange of large amounts of information through public channels has become an everyday occurrence, a situation that generates great risks in the case of possible cyber-attacks and motivates the academic and scientific community to develop new robust security schemes. The objective of the research was to use mathematical and artificial intelligence tools to propose new security schemes. The design and implementation of a crypto-steganographic algorithm for text is described below. The methodology employed consisted of using cellular automata to detect the edges of a carrier image, leveraging the color contrast diversity, and the Tinkerbell chaotic attractor to generate two pseudo-random sequences: one for the encryption scheme and the other to select the edge pixels of the carrier image where cryptogram bits are hidden. Additionally, a verification phase was included in which the receiver provides a code to confirm that the stegoimage was not altered. The system key is shared between the sender and the receiver using the Diffie-Hellman algorithm. The proposed algorithm was subjected to a series of steganographic and cryptographic performance tests, including entropy analysis, mean square error (MSE), correlation coefficients, key sensitivity, peak signal-to-noise ratio (PSNR), normalized root mean square error (NRMSE), and the structural similarity index (SSI). The results of PSNR, MSE and SSI test were compared with scientific benchmarks, revealing indicators that align with the standards of information security. Finally, a crypto-steganographic algorithm was consolidated as a result of an academic exercise whose indicators make it potentially applicable in real-world contexts.

Author Biographies

Marlon Arias-Cárdenas, Universidad Distrital Francisco José de Caldas, Colombia

Universidad Distrital Francisco José de Caldas, Bogotá-Colombia, mariasc@udistrital.edu.co

Deicy Alvarado-Nieto, Universidad Distrital Francisco José de Caldas, Colombia

Universidad Distrital Francisco José de Caldas, Bogotá-Colombia, lalvarado@udistrital.edu.co

Isabel Amaya-Barrera, Universidad Distrital Francisco José de Caldas, Colombia

Universidad Distrital Francisco José de Caldas, Bogotá-Colombia, iamaya@udistrital.edu.co

References

United Nation, “International Telecomunication Union,” sdgs.un.org. Accessed: Jun. 5, 2024. [Online]. Available: https://sdgs.un.org/un-system-sdg-implementation/international-telecommunication-union-itu-54247

C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, Oct. 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

C. E. Shannon, “A Mathematical Theory of Communication,” Bell Labs Technical Journal, vol. 27, no. 3, pp. 379-423, Jul. 1948. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

J. Von Neumann, “First draft of a report on the EDVAC,” in IEEE Annals of the History of Computing, vol. 15, no. 4, pp. 27-75, Dec. 1993. https://doi.org/10.1109/85.238389

S. Singh, The Code Book: The Secrets Behind Codebreaking, New York, NY, USA: Penguin random, 2002. https://www.penguinrandomhouse.com/books/168003/the-code-book-the-secrets-behind-codebreaking-by-simon-singh/9780375890123/

K M. M. de Leeuw, and J. Bergstra, Eds, “Computer Security” in The history of Information Security: A comprehensive handbook. Londres, Inglaterra: Elsevier Science, 2007. https://shop.elsevier.com/books/the-history-of-information-security/de-leeuw/978-0-444-51608-4

Y. Yu, “Preface to special topic on lattice-based cryptography,” National Science Review, vol. 8, no. 9, Sep. 2021. https://doi.org/10.1093/nsr/nwab154

M. J. Lucena López, Criptografía y Seguridad en Computadores, Jaen: Universidad de Jaén, 2022. https://ccia.esei.uvigo.es/docencia/SSI/cripto.pdf

A. Yaghouti Niyat, and M. H. Moattar, “Color image encryption based on hybrid chaotic system and DNA sequences,” Multimedia Tools and Applications, vol. 79, p. 1497–1518, Jan. 2020. https://doi.org/10.1007/s11042-019-08247-z

M. M. Savchuk, and A. V. Fesenko, “Quantum Computing: Survey and Analysis,” Cybernetics and Systems Analysis, vol. 55, pp. 10-21, Jan. 2019. https://doi.org/10.1007/s10559-019-00107-w

L. M. Cortés Martinez, L. D. Alvarado Nieto, and E. I. Amaya Barrera, “Composite cellular automata based encryption method applied to surveillance videos,” Dyna (Medellin), vol. 87, no. 213, pp. 212–221, Apr. 2020. https://doi.org/10.15446/dyna.v87n213.81859

M. Hussain, A. W. Abdul Wahab, Y. I. Bin Idris, A. T. S. Ho, and J. Ki-Hyun, “Image steganography in spatial domain: A survey,” Signal Processing: Image Communication, vol. 65, pp. 46-66, Jul. 2018. https://doi.org/10.1016/j.image.2018.03.012

D. R. I. M. Setiadi, “Improved payload capacity in LSB image steganography uses dilated hybrid edge detection,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 2, pp. 104-114, Feb. 2022. https://doi.org/10.1016/j.jksuci.2019.12.007

B. Stoyanov, and K. Kordov, “Novel secure pseudo-random number generation scheme based on two Tinkerbell maps,” Adv. Stud. Theor. Phys., vol. 9, no. 9, pp. 411–421, 2015. https://www.m-hikari.com/astp/astp2015/astp9-12-2015/p/stoyanovASTP9-12-2015.pdf

F. Y. Shih, Digital Watermarking and Steganography, Boca Ratón: CRC Press, 2017. https://doi.org/10.1201/9781315121109

M. Hassaballah, Digital media steganography: Principles, algorithms, and advances. San Diego, CA, Estados Unidos de América: Academic Press, 2020. https://doi.org/10.1016/C2018-0-04865-3

V. Lyubashevsky, “Lattice-based digital signatures,” National Science Review, vol. 8, no. 9, Sep. 2021. https://doi.org/10.1093/nsr/nwab077

R. S. Phadte, and R. Dhanaraj, “Enhanced blend of image steganography and cryptography,” in 2017 International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2017, pp. 230-235. https://doi.org/10.1109/ICCMC.2017.8282682

T. Saha, S. Sengupta and T. Dasgupta, “Chaotic cipher based spatial domain steganography with strong resistance against statistical attacks,” in 2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, India, 2017, pp. 365-370. https://doi.org/10.1109/ICRCICN.2017.8234536

A. Flores-Vergara et al., “Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic,” Nonlinear Dyn., vol. 96, no. 1, pp. 497–516, 2019. https://doi.org/10.1007/s11071-019-04802-3

I. Cherkaoui, and F. Zinoun, “On the use of Egyptian fractions for stream ciphers,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 26, no. 1, pp. 139-152, Nov. 2021. https://doi.org/10.1080/09720529.2021.1923921

Y. Satria, M. T. Suryadi and D. J. Cahyadi, “Digital text and digital image encryption and steganography method based on SIYu map and least significant bit,” Journal of Physics Conference Series, vol. 1821, no. 1, p. 012035, Mar. 2021. https://doi.org/10.1088/1742-6596/1821/1/012035

S. Kumar, P. K. Srivastava, G. K. Srivastava, P. Singhal, D. Singh, and D. Goyal, “Chaos based image encryption security in cloud computing,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 4, pp. 1041-1051, Jun. 2022. https://doi.org/10.1080/09720529.2022.2075085

H. El Bourakkadi, A. Chemlal, H. Tabti, M. Kattass, A. Jarjar, and A. Benazzi, “Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images,” International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 2684-2694, Jun. 2024. https://doi.org/10.11591/ijece.v14i3

J. Mohammed and D. R. Nayak, “An efficient edge detection technique by two dimensional rectangular cellular automata,” in International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India, 2014, pp. 1-4. https://doi.org/10.1109/ICICES.2014.7033847

S. Kumar, A. Singh, and M. Kumar, “Information hiding with adaptive steganography based on novel fuzzy edge identification,” Defence Technology, vol. 15, no. 2, pp. 162-169, Apr. 2019. https://doi.org/10.1016/j.dt.2018.08.003

B. Lakshmi Sirisha, and B. Chandra Mohan, “Review on spatial domain image steganography techniques,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, no. 6, pp. 1873-1883, Sep. 2021. https://doi.org/10.1080/09720529.2021.1962025

S. Amrogowicz, Y. Zhao, and Y. Zhao, “An edge detection method using outer Totalistic Cellular Automata,” Neurocomputing, vol. 214, pp. 643-653, Nov. 2016. https://doi.org/10.1016/j.neucom.2016.05.092

A. Kumar, and S. K. Sharma, “Information cryptography using cellular automata and digital image processing,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 4, pp. 1105-1111, 2022. https://doi.org/10.1080/09720529.2022.2072437

N. Kar, K. Mandal and B. Bhattacharya, “Improved chaos-based video steganography using DNA alphabets,” ICT Express, vol. 4, no. 1, pp. 6-13, Mar. 2018. https://doi.org/10.1016/j.icte.2018.01.003

M. Arias Cárdenas, “Criptosistema Esteganográfico a través de Imágenes Digitales para el Cifrado de Texto Usando Teoría del Caos y Autómatas Celulares,” Tesis de grado, Universidad Distrital Francisco José de Caldas, Bogotá, 2020. https://repository.udistrital.edu.co/items/a34dbf52-d2c1-40f9-a1dc-a6d9ec463ab4

OpenSSL Corporation, “OpenSSL Cryptography and SSL/TLS Toolkit,” openssl.org. Accessed: [Online]. Available: https://www.openssl.org/. https://www.openssl.org/

W. Diffie, and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976. https://doi.org/10.1109/TIT.1976.1055638

G. Van Rossum. Python Software. V3.13, (2024). Centrum Wiskunde & Informatica (CWI). Netherlands. [Online]. Available: http://www.Python.org

S. Yuan, T. Jiang, and Z. Jing, “Bifurcation and Chaos in the Tinkerbell Map,” International Journal of Bifurcation and Chaos, vol. 21, no. 11, pp. 3137-3156, 2011. https://doi.org/10.1142/S0218127411030581

USC Viterbi School of Engineering, “Signal and Image Processing Institute,” sipi.usc.edu. Accessed: Jun. 5, 2009. [Online]. Available: https://sipi.usc.edu/database/database.php

L. Pardo LLorente, “Teoría de la información estadística,” Estadística Española, vol. 35, no. 133, pp. 195-268, 1993. https://ine.es/ss/Satellite?blobcol=urldata&blobheader=application%2Fpdf&blobheadername1=Content-Disposition&blobheadervalue1=attachment%3B+filename%3D133_1.pdf&blobkey=urldata&blobtable=MungoBlobs&blobwhere=583%2F542%2F133_1%2C0.pdf&ssbinary=true

A. Saha, N. Manna, and S. Mandal, “India,” in Information theory, coding and cryptography: Pearson Education, 2013. https://books.google.com.co/books/about/Information_Theory_Coding_and_Cryptograp.html?id=iUI8BAAAQBAJ&redir_esc=y

How to Cite
[1]
M. Arias-Cárdenas, D. Alvarado-Nieto, and I. Amaya-Barrera, “Steganographic Cryptosystem Based on the Use of Chaos Theory and Cellular Automata”, TecnoL., vol. 27, no. 61, p. e3132, Nov. 2024.

Downloads

Download data is not yet available.
Published
2024-11-12
Section
Research Papers
Article metrics
Abstract views
Galley vies
PDF Views
HTML views
Other views
Crossref Cited-by logo