High payload data-hiding in audio signals based on a modified OFDM approach
Expert Systems with Applications: An International Journal
Suitability of chaotic iterations schemes using XORshift for security applications
Journal of Network and Computer Applications
Hi-index | 0.00 |
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated. This research work presents a new class of non-blind information hiding algorithms based on some finite domains iterations that are Devaney's topologically chaotic. The approach is entirely formalized and reasons to take place into the mathematical theory of chaos are explained. Finally, stego-security and chaos security are consequently proven for a large class of algorithms.