skip to main content
10.1145/1516241.1516299acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Embedding secret messages based on chaotic map and Huffman coding

Published: 15 February 2009 Publication History

Abstract

In this paper, an efficient and secure data hiding scheme is proposed. The cover medium is compressed by a revised Huffman coding. Based on the lossless Huffman coding, not only images but also text files can be used as the cover media. The secret information is embedded into the compressed code by using the revised Huffman coding. Before embedding, the secret information is rearranged by a logistic map with a private key for achieving the purpose of security. The experimental results show that our proposed scheme is secure because only the receiver who owns the private key can decrypt the secert information.

References

[1]
T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, second edition, MIT Press, Cambridge, MA, 2001.
[2]
M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, "Lossless Generalized-LSB Data Embedding," IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253--265, February 2005.
[3]
Z. Dawei, C. Guanrong and L. Wenbo, "A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm," Choas, Solitons & Fractals, vol. 22, pp. 47--54, October 2004.
[4]
R. L. Devaney, A First Course in Chaotic Dynamical Systems - Theory and Experiment, Addison-Wesley, Reading, MA, 1992.
[5]
D. A. Huffman, "A Method for the Construction of Minimum Redundancy Codes," Proceedings of the Institute of Radio Engineers, vol. 40, pp. 1098--1101, September 1952.
[6]
A. B. Hussein, "A Novel Lossless Data Compression Scheme Based on the Error Correcting Hamming Codes," Computers & Mathematics with Applications, vol. 56, no. 1, pp. 143--150, July 2008.
[7]
S. H. Liu, H. X. Yao, W. Gao and Y. L. Liu, "An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-Pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869--882, February 2007.
[8]
W. Lu, H. Lu and F. L. Chung, "Robust Digital Image Watermarking Based on Subsampling," Applied Mathematics and Computation, vol. 181, no. 2, pp. 886--893, October 2006.
[9]
A. Mooney and J. G. Keating, "Generation and Detection of Watermarks Derived from Chaotic Functions," Proceedings of Opto-Ireland 2005: Imaging and Vision, vol. 5823, pp. 58--69, Dublin, June 2005.
[10]
Y. Ma, H. Derksen, W. Hong and J. Wright, "Segmentation of Multivariate Mixed Data via Lossy Coding and Compression," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1546--1562, September 2007.
[11]
Http://news.bbc.co.uk/, Jul. 2008.
[12]
Http://www.cnn.com/, Jul. 2008.

Cited By

View all
  • (2014)Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets2014 International Conference on Information Systems and Computer Networks (ISCON)10.1109/ICISCON.2014.6965223(83-87)Online publication date: Mar-2014
  • (2012)Hiding Secret Messages in Huffman TreesProceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing10.1109/IIH-MSP.2012.23(71-74)Online publication date: 18-Jul-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Huffman code
  2. chaotic map
  3. data hiding
  4. lossless data compression

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets2014 International Conference on Information Systems and Computer Networks (ISCON)10.1109/ICISCON.2014.6965223(83-87)Online publication date: Mar-2014
  • (2012)Hiding Secret Messages in Huffman TreesProceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing10.1109/IIH-MSP.2012.23(71-74)Online publication date: 18-Jul-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media