Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography

Authors

DOI:

https://doi.org/10.30526/38.3.3619

Keywords:

Random Key Generator, Chaotic Dynamic System, Information Security, Spatial Domain, Frequency Domain, Chaos, Lyapunov Exponents, Fractal Dimension, Bifurcation

Abstract

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection

Author Biographies

  • Mohammed Abod Husain, Department of Mathematics, College of Science, University of Baghdad.

    Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq

  • Saad Al-Momen, Department of Mathematics, College of Science, University of Baghdad.

    Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq

References

1. Almuhammadi S, Al-Shaaby A. A survey on recent approaches combining cryptography and steganography. Comput Sci Inf Technol 2017;:63–74. https://doi.org/10.5121/csit.2017.70306

2. Abdulwahed MN, T MS, Mohd Rahim MS. Image spatial domain steganography: a study of performance evaluation parameters. IEEE Int Conf Syst Eng Technol 2019;:309–314. https://doi.org/10.1109/ICSEngT.2019.8906402

3. Tanna S. Codes, ciphers, steganography & secret messages. Answers 2000 Ltd, England; 2000.

4. Pramanik S, Raja SS. A secured image steganography using genetic algorithm. Adv Math Sci J 2020;9(7):4533–4541. https://doi.org/10.37418/amsj.9.7.22

5. Öztürk I, Kılıç R. A novel method for producing pseudo random numbers from differential equation-based chaotic systems. Nonlinear Dyn 2015;80(1–2):1147–1157. https://doi.org/10.1007/s11071-015-1932-5

6. Majeed MA, Sulaiman R, Shukur Z, Hasan MK. A review on text steganography techniques. Mathematics 2021;9(21):2829. https://doi.org/10.3390/math9212829

7. Melad SJ. A new technique based on chaotic steganography and encryption text in DCT domain for color image. J Eng Sci Technol 2013;8(5):508–520.

8. Elkamchouchi H, Salama WM, Abouelseoud Y. Data hiding in a digital cover image using chaotic maps and LSB technique. Int Conf Comput Eng Syst 2017;:198–203. https://doi.org/10.1109/ICCES.2017.8275302

9. K M. Analysis of HSI color model on chaos theory in spatial domain. Int J Anal Exp Modal Anal 2019;11:3162–3165.

10. Kasapbaşı MC. A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access 2019;7:148495–510. https://doi.org/10.1109/ACCESS.2019.2946807

11. Hameed SM, Ali ZH, Al-Khafaji GK, Ahmed S. Chaos-based color image steganography method using 3D Cat Map. Iraqi J Sci 2021;62(9):3220–3227. https://doi.org/10.24996/ijs.2021.62.9.34

12. Maghool FH, Naji RK. Chaos in the three-species Sokol-Howell food chain system with fear. Commun Math Biol Neurosci 2022;2022:Article ID 14. https://doi.org/10.28919/cmbn/7056

13. Silva-Juarez A, Rodriguez-Gomez G, de la Fraga LG, Guillen-Fernandez O, Tlelo-Cuautle E. Optimizing the Kaplan–Yorke dimension of chaotic oscillators applying DE and PSO. Technol 2019;7(2):38. https://doi.org/10.3390/technologies7020038

14. Leonov GA, Kuznetsov NV, Korzhemanova NA, Kusakin DV. Lyapunov dimension formula for the global attractor of the Lorenz system. Commun Nonlinear Sci Numer Simul 2016;41:84–103. https://doi.org/10.1016/j.cnsns.2016.04.032

15. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, et al. SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Natl Inst Stand Technol 2010. https://doi.org/10.6028/NIST.SP.800-22r1a

16. Hussein MA, Al-Momen S. Linear feedback shift registers-based randomization for image steganography. Iraqi J Sci 2023;64(8):4416–4428. https://doi.org/10.24996/ijs.2023.64.8.34

17. Alyousuf FQA, Din R, Qasim AJ. Analysis review on spatial and transform domain technique in digital steganography. Bull Electr Eng Inform 2020;9(2):573–581. https://doi.org/10.11591/eei.v9i2.2068

18. AbdelWahab OF, Hussein AI, Hamed HF, Kelash HM, Khalaf AA, Ali HM. Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA 2019;17(3):1168–1175. https://doi.org/10.12928/TELKOMNIKA.v17i3.12230

19. Li X, Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 2007;177(15):3099–3109. https://doi.org/10.1016/j.ins.2007.02.008

20. Senthooran V, Ranathunga L. DCT coefficient dependent quantization table modification steganographic algorithm. Int Conf Netw Soft Comput 2014;:192–196. http://doi.org/10.1109/CNSC.2014.6906644

Downloads

Published

20-Jul-2025

Issue

Section

Mathematics

How to Cite

[1]
Husain, M.A. and Al-Momen, S. 2025. Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography. Ibn AL-Haitham Journal For Pure and Applied Sciences. 38, 3 (Jul. 2025), 301–315. DOI:https://doi.org/10.30526/38.3.3619.