IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Bilgisayar Bilimleri ve Teknolojileri Dergisi
  • Volume:5 Issue:2
  • An Efficient Steganography Method Based on Chaotic Functions and XOR Operation for Data Hiding

An Efficient Steganography Method Based on Chaotic Functions and XOR Operation for Data Hiding

Authors : Selman Yakut
Pages : 59-66
Doi:10.54047/bibted.1593334
View : 48 | Download : 84
Publication Date : 2024-12-31
Article Type : Research Paper
Abstract :The advancing technology and digitalizing world have increased the importance of secure data transmission. Steganography, a technique that ensures secure data communication, is a critical component of data security. Derived from the term meaning \\\"hidden writing\\\" in Turkish, steganography is based on the principle of embedding the data to be hidden into a carrier medium. While historically applied using primitive methods, steganography has transitioned to the use of modern techniques and methods in today’s digitalized era. In this study, a steganography method based on chaotic functions and the XOR operation is proposed. The proposed method consists of two stages. In the first stage, data embedding, the data to be hidden is first converted into binary format. This binary data is then subjected to an XOR operation with a tent map sequence. The resulting final data is embedded into a grayscale image by determining its embedding positions using a logistic map. In the second stage, data extraction, the embedded message is retrieved using the logistic map, and the extracted message is XORed with the tent map to recover the original data. The effectiveness of the proposed method was evaluated using commonly employed metrics such as PSNR, MSE, and SSIM on images in the literature. The results demonstrate that the proposed method offers a robust structure against steganalysis techniques while ensuring critical security parameters.
Keywords : Steganografi, Kaotik fonksiyonlar, Logistic harita, Tent harita

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025