Digital Image Hiding Technology Combining 2D Logistic Mapping and 2D-DCT
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    To cope with increasingly serious problems related to image security, this study proposes a digital image hiding algorithm based on two-dimensional (2D) Logistic mapping and 2D discrete cosine transform (2D-DCT). Firstly, the chaotic sequence generated by the 2D Logistic mapping is used to diffuse and scramble pixels of the secret image so that the secret image can be encrypted. Then, 2D-DCT is performed on the host image in blocks, and the image information after diffusion and scrambling is stored in the lower right corner of each block after 2D-DCT. Finally, 2D inverse discrete cosine transform (2D-IDCT) is carried out to yield the stego image. Experimental results also show that the proposed algorithm is safe, feasible, and effective in image hiding.

    Reference
    Related
    Cited by
Get Citation

程东升,隆广庆,朱小玲.结合二维Logistic映射与二维离散余弦变换的数字图像隐藏技术.计算机系统应用,2022,31(5):382-387

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 20,2021
  • Revised:August 18,2021
  • Adopted:
  • Online: April 11,2022
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063