Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
DOI:
https://doi.org/10.30526/38.3.3619Keywords:
Random Key Generator, Chaotic Dynamic System, Information Security, Spatial Domain, Frequency Domain, Chaos, Lyapunov Exponents, Fractal Dimension, BifurcationAbstract
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection
References
1. Almuhammadi S, Al-Shaaby A. A survey on recent approaches combining cryptography and steganography. Comput Sci Inf Technol 2017;:63–74. https://doi.org/10.5121/csit.2017.70306
2. Abdulwahed MN, T MS, Mohd Rahim MS. Image spatial domain steganography: a study of performance evaluation parameters. IEEE Int Conf Syst Eng Technol 2019;:309–314. https://doi.org/10.1109/ICSEngT.2019.8906402
3. Tanna S. Codes, ciphers, steganography & secret messages. Answers 2000 Ltd, England; 2000.
4. Pramanik S, Raja SS. A secured image steganography using genetic algorithm. Adv Math Sci J 2020;9(7):4533–4541. https://doi.org/10.37418/amsj.9.7.22
5. Öztürk I, Kılıç R. A novel method for producing pseudo random numbers from differential equation-based chaotic systems. Nonlinear Dyn 2015;80(1–2):1147–1157. https://doi.org/10.1007/s11071-015-1932-5
6. Majeed MA, Sulaiman R, Shukur Z, Hasan MK. A review on text steganography techniques. Mathematics 2021;9(21):2829. https://doi.org/10.3390/math9212829
7. Melad SJ. A new technique based on chaotic steganography and encryption text in DCT domain for color image. J Eng Sci Technol 2013;8(5):508–520.
8. Elkamchouchi H, Salama WM, Abouelseoud Y. Data hiding in a digital cover image using chaotic maps and LSB technique. Int Conf Comput Eng Syst 2017;:198–203. https://doi.org/10.1109/ICCES.2017.8275302
9. K M. Analysis of HSI color model on chaos theory in spatial domain. Int J Anal Exp Modal Anal 2019;11:3162–3165.
10. Kasapbaşı MC. A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access 2019;7:148495–510. https://doi.org/10.1109/ACCESS.2019.2946807
11. Hameed SM, Ali ZH, Al-Khafaji GK, Ahmed S. Chaos-based color image steganography method using 3D Cat Map. Iraqi J Sci 2021;62(9):3220–3227. https://doi.org/10.24996/ijs.2021.62.9.34
12. Maghool FH, Naji RK. Chaos in the three-species Sokol-Howell food chain system with fear. Commun Math Biol Neurosci 2022;2022:Article ID 14. https://doi.org/10.28919/cmbn/7056
13. Silva-Juarez A, Rodriguez-Gomez G, de la Fraga LG, Guillen-Fernandez O, Tlelo-Cuautle E. Optimizing the Kaplan–Yorke dimension of chaotic oscillators applying DE and PSO. Technol 2019;7(2):38. https://doi.org/10.3390/technologies7020038
14. Leonov GA, Kuznetsov NV, Korzhemanova NA, Kusakin DV. Lyapunov dimension formula for the global attractor of the Lorenz system. Commun Nonlinear Sci Numer Simul 2016;41:84–103. https://doi.org/10.1016/j.cnsns.2016.04.032
15. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, et al. SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Natl Inst Stand Technol 2010. https://doi.org/10.6028/NIST.SP.800-22r1a
16. Hussein MA, Al-Momen S. Linear feedback shift registers-based randomization for image steganography. Iraqi J Sci 2023;64(8):4416–4428. https://doi.org/10.24996/ijs.2023.64.8.34
17. Alyousuf FQA, Din R, Qasim AJ. Analysis review on spatial and transform domain technique in digital steganography. Bull Electr Eng Inform 2020;9(2):573–581. https://doi.org/10.11591/eei.v9i2.2068
18. AbdelWahab OF, Hussein AI, Hamed HF, Kelash HM, Khalaf AA, Ali HM. Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA 2019;17(3):1168–1175. https://doi.org/10.12928/TELKOMNIKA.v17i3.12230
19. Li X, Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 2007;177(15):3099–3109. https://doi.org/10.1016/j.ins.2007.02.008
20. Senthooran V, Ranathunga L. DCT coefficient dependent quantization table modification steganographic algorithm. Int Conf Netw Soft Comput 2014;:192–196. http://doi.org/10.1109/CNSC.2014.6906644
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ibn AL-Haitham Journal For Pure and Applied Sciences

This work is licensed under a Creative Commons Attribution 4.0 International License.
licenseTerms