Skip to main content <#maincontent>
We will keep fighting for all libraries - stand with us!
Internet Archive logo A line drawing of the Internet Archive
headquarters building façade.
Search icon An illustration of a magnifying glass.
Search icon An illustration of a magnifying glass.
Upload icon An illustration of a horizontal line over an up pointing
arrow. Upload
User icon An illustration of a person's head and chest. Sign up
| Log in
Web icon An illustration of a computer application window
Wayback Machine
Texts icon An illustration of an open book.
Books
Video icon An illustration of two cells of a film strip.
Video
Audio icon An illustration of an audio speaker.
Audio
Software icon An illustration of a 3.5" floppy disk.
Software
Images icon An illustration of two photographs.
Images
Donate icon An illustration of a heart shape
Donate
Ellipses icon An illustration of text ellipses.
More
Hamburger icon An icon used to represent a menu that can be toggled by
interacting with this icon.
Internet Archive Audio
Live Music Archive Librivox Free
Audio
Featured
* All Audio
* This Just In
* Grateful Dead
* Netlabels
* Old Time Radio
* 78 RPMs and Cylinder Recordings
Top
* Audio Books & Poetry
* Computers, Technology and Science
* Music, Arts & Culture
* News & Public Affairs
* Spirituality & Religion
* Podcasts
* Radio News Archive
Images
Metropolitan Museum
Cleveland
Museum of Art
Featured
* All Images
* This Just In
* Flickr Commons
* Occupy Wall Street Flickr
* Cover Art
* USGS Maps
Top
* NASA Images
* Solar System Collection
* Ames Research Center
Software
Internet Arcade Console
Living Room
Featured
* All Software
* This Just In
* Old School Emulation
* MS-DOS Games
* Historical Software
* Classic PC Games
* Software Library
Top
* Kodi Archive and Support File
* Vintage Software
* APK
* MS-DOS
* CD-ROM Software
* CD-ROM Software Library
* Software Sites
* Tucows Software Library
* Shareware CD-ROMs
* Software Capsules Compilation
* CD-ROM Images
* ZX Spectrum
* DOOM Level CD
Books
Books to Borrow Open Library
Featured
* All Books
* All Texts
* This Just In
* Smithsonian Libraries
* FEDLINK (US)
* Genealogy
* Lincoln Collection
Top
* American Libraries
* Canadian Libraries
* Universal Library
* Project Gutenberg
* Children's Library
* Biodiversity Heritage Library
* Books by Language
* Additional Collections
Video
TV News Understanding 9/11
Featured
* All Video
* This Just In
* Prelinger Archives
* Democracy Now!
* Occupy Wall Street
* TV NSA Clip Library
Top
* Animation & Cartoons
* Arts & Music
* Computers & Technology
* Cultural & Academic Films
* Ephemeral Films
* Movies
* News & Public Affairs
* Spirituality & Religion
* Sports Videos
* Television
* Videogame Videos
* Vlogs
* Youth Media
Search the history of over 835 billion web pages
on the Internet.
Search the Wayback Machine
Search icon An illustration of a magnifying glass.
Mobile Apps
* Wayback Machine (iOS)
* Wayback Machine (Android)
Browser Extensions
* Chrome
* Firefox
* Safari
* Edge
Archive-It Subscription
* Explore the Collections
* Learn More
* Build Collections
Save Page Now
Capture a web page as it appears now for use as a trusted citation in
the future.
Please enter a valid web address
* About
* Blog
* Projects
* Help
* Donate
* Contact
* Jobs
* Volunteer
* People
* Sign up for free
* Log in
Search metadata
Search text contents
Search TV news captions
Search radio transcripts
Search archived web sites
Advanced Search
* About
* Blog
* Projects
* Help
* Donate Donate icon An illustration of a heart shape
* Contact
* Jobs
* Volunteer
* People
Full text of "Hiding of Speech based on Chaotic Steganography and
Cryptography Techniques
"
See other formats
International Journal of Engineering Research
Volume No.4, Issue No.4, pp : 165-172
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
Hiding of Speech based on Chaotic Steganography and Cryptography
Techniques
Abbas Salman Hameed
Assistant Lecturer, Electronic Engineering Department, College of Engineering, Diyala Universityjraq
Email: abbasfuture@yahoo.com
Abstract: The technique of embedding secret information into
cover media, like image, video, audio and text called
Steganography, so that only the sender and the authorized
recipient who have a key can detect the presence of secret
information. In this paper Steganography and Cryptography
techniques of speech present with Chaos. Fractional order
Lorenz and Chua systems that provides an expanded in key
space are used to encrypt speech message. The large key
space addition to all properties of randomness and
nonlinearity which are possessed these chaotic systems ensure
a highly robustness and security for cryptography process. As
well as Modified Android Cat Map (MACM) offers additional
space and security for steganography process. The irregular
outputs of the MACM are used in this paper to embed a secret
message in a digital cover image. The results show a large key
sensitivity to a small change in the secret key or parameters of
MACM. Therefore, highly security hiding for speech will be
guaranteed by using this system.
Key Words: Steganography, Cryptography, Fractional
Order chaotic system, Modified Android Cat Map
1. Introduction:
In the digital world, data is the heart of computer
communication and global economy. To ensure the security of
the data, the concept of data hiding has attracted people to
come up with creative solutions to protect data from falling into
wrong hands [1].
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the
intended recipient knows of the existence of the message.
Steganography works by replacing bits of useless or unused
data (embedded) in regular computer files (such as
graphics, sound, text, or HTML) with bits of different,
invisible information. This hidden information can be plain
text, cipher text, or even images [2] . To add more security, the
data to be hidden is encrypted with a key during the embedding
process. To extract the hidden information, one should have the
key.
Steganography and cryptography are the two different
information hiding techniques which provide confidentiality
and integrity of data. Steganography technique aims at
transmitting a message on a channel. The goal of
steganography is to hide messages inside other "harmless"
digital media in a way that does not allow any person to even
detect the presence of secret message. Cryptography hides the
contents of a secret message from an unauthorized people but
the content of the message is visible. In cryptography, the
structure of a message is scrambled in such a way as to make it
meaningless and unintelligible manner [1,3].
For Cryptography process, Chaos is a typical behavior of
nonlinear dynamic systems. It is characterized by extremely
sensitive to parameters and initial conditions, mathematically
defined as randomness governed by simple deterministic rules
[4]. A high dimensional chaotic system like Lorenz or Chua
system will give a more complex structure, more system
variables, and parameters. Then the crypto system's key space
will be larger for integer orders, and the system variables time
sequence will be more erratic and unpredictable than using the
low dimension chaotic system [5].
This paper demonstrates Encryption of speech using
fractional order chaotic systems (Non integer orders) to
increase the security level of generated key then embedded the
encrypted data in cover image after applied Modified Arnold
Cat Map (MACM) to shuffle the image pixels before
embedded process.
The paper is organized as follows; section 2 describes the
Fraction Order Lorenz and Chua systems and the Chaotic Key
Generation. Section 3 shows the embedded process using
MACM. The system model of steganography and encrypted
speech is presented in section 4. In section 5, the simulation
results of hiding and encryption speech message using chaos
are presented. Finally, conclusions are presented in section 6.
2. Chaotic Cryptography:
Chaos is one of the possible behaviors associated with
evolution of a nonlinear physical system and occurs for
specific values of system parameters.
Chaotic systems have many important properties, such as the
sensitive dependence on initial conditions and system
parameters, pseudorandom property, no periodicity and
topological transitivity, etc. Most properties meet some
requirements such as diffusion and mixing in the sense of
cryptography. Therefore, chaotic cryptosystems have more
useful and practical applications [6] .
Chaotic systems can be divided into those described by
differential equations, known as flows such as: Lorenz System
[7], Rossler System [8], Chua system [9]. And those described
by difference equations, known as maps such as: logistic map
[8], Henon map [10], Arnold Cat Map (ACM) [11],... etc.
2.1 Fraction Order Lorenz and Chua systems:
The mathematical description of the fractional-order
Lorenz system is expressed as [5]:
D sl x = a L (y - x)
D c2 y - -xz -f pi x - y
D" 2 z = xy — 0 L z
where (a L , p L , p L ) are system parameters ,(al, a2 and a3)
determine the fractional orders of the equation and (a 1, a2,
IJER@2015
Page 165
International Journal of Engineering Research
Volume No.4, Issue No.4, pp : 165-172
a3 > 0) . When al= a2= a3 = 1, Eq. 1 becomes the
ordinary integer orders Lorenz system.
Whereas, the mathematical description for fractional -order
Chua system [12], can be expressed as:
D n x = v c (y - x) - (r c F(x)
D^y =x-y+Z (2]
Fix) = m L x -f (m D - m t ) * (\x + l| - \x - ll)
where (a c , Pc ? Pc> mo, W\) are system parameters ,(yl, y2
and y 3) determine the fractional orders of the equation and
(yl, y2, y3> 0).
The solution of fractional-order Lorenz system using
Fractional Backward Difference Methods [13] can be written
as:
(
x n = k" 1 *[a L * (y^-t - iJ] ~~ ^ w k x(m - k-j
(3)
3*11 = ^ * [-^in-l. * *r*-l + Pi -
ic = i
And for Chua system can be written as:
x r; = h yL * [a c * C>' m -i - Xn-i) - cr c * Fix") ] ...
m
— ^ Wfrx(rn — kfr)
C4)
where /z, is step size parameter and m = 0,1,2,..,N. The
coefficients w k can be computed in a recursive scheme (with w 0
= l)by
/ p + 1\
w-k = j^— Jwk_ l (5]
where is a or y order corresponding to chaotic sequence type.
2.2 Chaotic Key Generation:
To generate chaotic key used to encrypt the speech
message, the sequences generated from fraction-order Lorenz
system and fraction-order Chua system are pre-processing by
magnification and modulo transformation to the two chaos
types sequences as:
(M L (;nj = mod(floor(.M L (:n) X 10 L5 X 2' Y ) for Lorenz
Utf c (n) =modffloor(M c (rd xlQ 16 X2 jV ) for Chua (6]
where M L and M c , are (x, y, z) sequences for Lorenz and Chua
respectively. N is maximum number of bits required to quantize
M into an integer sequence.
Then, to make proposed system more secure, the fractional -
order of Lorenz and Chua sequences are combined together by
using XOR to get new chaotic sequences as in Eq. 7.
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
XfeO = BITXOR(x L ^n) f y c M f z L (n})
K 2 (n) = BITXQR(x c {n) f y L GO, z c W ) (7]
,K 2 (n) = BITX0R(x L (nl.x c (7{})
The combined of these sequences are improved the security
level of the system by enhancing the encryption process
complexity, the key space and the robustness of the
cryptosystem.
To get highly random and uncorrelated key, ^i(n) and
K 2 (n) are fed to a 2x1 multiplexer which dynamically selects
one of randomly key dependent on random value of ^(n) to
produce the next member of output keystream as shown in Fig.
1.
-
z<
i no 1
— ►
laotic
— ►
U
— ►
2x1
MUX
-> Key
Generated
Fig. 1 Block diagram of Chaotic Key Generation.
3. Embedded Data using ACM:
Digital covers have a large number of redundant bits such
least significant bits (LSB). In the substitution technique of
steganography, the bits of the secret message substitute the
LSB of the bytes of the cover file without causing a drastic
change to this cover file [14]. To increase the security of
embedded process, a secret message is embedded in the
irregular output pixels of the Arnold Cat Map (ACM) that is
applied on a digital cover image.
ACM is used in the embedding process in order to improve
the image hiding safety and visual quality of the extracted
message. Which when applied to a digital image randomizes
the original organization of its pixels and the image becomes
imperceptible or noisy. So, the secret message will become
chaotic on the embedding process and if the receiver side
wants to extract the secret message it should know the exact
location which was used for embedding. In this way, it is
becoming exponentially hard to recover the initial message
without knowing the original transformation or the secret key.
However, ACM has a period p to shuffle image pixels and if
iterated p number of times, the original image reappears [15].
The generalized form of ACM can be given by the
transformation [15].
r : T 2 -*T 2 such that:
£)=( \ ^)(J)(modN) (8)
where, x, y {0, 1, 2 ... N —1} and N is the size of a digital
image.
It can easily be seen that the original Arnold
transformations given by Eq. 8 can be modified to produce a
sequence of Modified Arnold Cat Map (MACM) [15] by
introducing new three parameters (a,b,c) to increase and
ensure high security implementation as:
IJER@2015
Page 166
International Journal of Engineering Research
Volume No.4, Issue No.4, pp : 165-172
V
c ~ -1
( v )(modN)
(9)
b + .
Lc 1 -h c b
where a,b and c are positive integer values considered as a
control parameters and (a, b, c)E R, x' and y' are the coordinate
values of the shuffled pixel.
4. SYSTEM MODEL:
The proposed system is shown in Fig. 2. First, the speech
signal is preprocessed and quantized to get the corresponding
speech bitstream. The speech bitstream is then XORed with the
chaotic Key generation as in section 2.2 to generate encrypted
data.
Before embedded the encrypted speech message in image
pixel, the cover image is permutated using MACM with p
iteration and (a, b, c) parameters to increase and ensure high
security implementation. After that, inverse process of
Modified Arnold Cat mapping (IMACM) is done on the image
to rearrangement the image coordinate values of the shuffled
pixel, and then the result stego image is transmitted.
Received
Speech message
Dequantizer
Decrypted data
M
Extract
Embedded l^j C
Encrypted data
Initial value
for Lorenz
x(0)v(0)z(0)
Initial value
for Chua
x(0)v(0)z(0)
TTT
Chaotic Key Generation
Stego image transmitted with
secret message
MACM parameter
p a b c
Secret speech
message
Quantizer
ST -
Encrypted data
il
Embedded
process
Cover image
Transmitted side
Fig. 2 Block Diagram of Proposed Hiding and Encryption
Speech at Transmitted Side, Decryption and Extraction at
Receiver Side.
At the receiver side, MACM must be performed on the
received stego image to extracted encrypted data. Then the
decrypted process is executed by the same chaotic key used in
transmitted side.
5. Simulation Results:
The simulation uses the following referencing speech file:
"Army moves toward the enemy and should be fighting at zero
moment" . The speech signal is sampled at 8 kHz and is
quantized with 10 bits / sample, 58.6 k byte with respect to 60
msec, as shown in Fig. 3.
Fig. 3 Original Speech Signal.
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
In this simulation, Grayscale image of size 800x800 pixels is
used as a cover image to test the proposed algorithm. The
images used are shown in Fig. 4.
Fig. 4 Grayscale Parrot Cover Image.
5.1 Test of Chaotic Cryptography:
The fraction-order Lorenz system used to generate secure
chaotic key has these qualifications:- Fraction order: al=0.96,
a2=0.98, a3=l.l. The control parameters: o L =10, Pl=28,
p L =8/3. The initial conditions: jc(0)=0.1j(0)=-0.1, z (0)=20.
Integer step-size: h=0.01.
And fraction-order Chua system is based on these
qualifications:- Fraction order: y 1=0. 97, y2=l, y3=1.01. The
control parameters: a c =10, p c =14.78, p c =0.0385, m 0 =-1.27,
mi=-0.68. The initial conditions: jc(0)= 0.2, y(0)= 0.1, z(0)=
0.1. Integer step-size: h=0. 01. The encrypted and decrypted
speech generated by using chaotic key has these parameters are
shown in Fig. 5.
1111
II I II II 1 1 III 1 1 1 II
lllllllll'll^llllllllll
Encrypted Speech
0.5 -
0.4 -
Decrypted Speech
Fig. 5 Encrypted and Decrypted Speech using Chaotic Key.
5.1.1 Sensitivity to Fractional Orders:
The sequences response of Chaos is very sensitive to any
small change in fraction-order values. To show that, for the
Lorenz, x time response for two identical systems with the
IJER@2015
Page 167
International Journal of Engineering Research
Volume No.4, Issue No.4, pp : 165-172
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
same parameters but starting from different fractional orders,
10" 6 to be difference, is shown in Fig. 6.
Fig. 6 Time series of variables x for Lorenz system.
As well, Fig. 7 shows x time response for two Chua system
with the same parameters but starting from different fractional
orders, 10" 6 to be difference.
Fig. 7 Time series of variables x for Chua system.
Also, test effect of all fraction-order of Lorenz system on
the decrypted speech signal is done. Fig. 8 shows the decrypted
process of the signal that is generation with chaotic key has
default parameters, with three chaotic keys have same
parameters except only one parameter of key is changed at a
time by 10 °
respectively.
as ai=0.960001, a 2 =0.980001, and =0.1OOO01
0 10 20 30 40 50 60
Time
Decrypted Speech with y(0}= -0.100001
Fig. 10 Decrypted Process with Deference in Initial Values of
Lorenz System.
As well, to show the key sensitivity for initial values of
Chua system, three chaotic keys will be tested in decrypted
process. Each of them only changes the one of initial vales at a
time and keeping all other parameters of chaotic key unchanged
as Jt(tf)=0.200001, y(0)= 0.100001, and z(0)=0A0000l
respectively. The results are shown in Fig. 11.
0 10 20 30 40 50 60
Time
Decrypted Speech with xfO) =0.200001
Time
Decrypted Speech with \(0)= 0.100001
0 10 20 30 40 50 60
Decrypted Speech with zCO)=0. 100001
Fig. 11 Decrypted Process with Deference in Initial Values of
Chua System.
5.1.3 Sensitivity to control parameters:
To test the effect of small change in control parameters for
Lorenz or Chua system, Fig. 12 shows decrypted speech by the
two chaotic key generated with small change in one control
parameter at atime compared with defualt parameter used to
generate chaotic key at transmitted side as a L = 10.000001,
p c = 14.780001 respectively, as example, at the received side.
0 10 20 30 40 50 60
Time
Decrypted Speech with O |_ = 10 000001
IJER@2015
Page 169
International Journal of Engineering Research
Volume No.4, Issue No.4, pp : 165-172
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
Decrypted Speech with P C = 14 780001
Fig. 12 Decrypted Process with Deference in a L , p c of Lorenz
and Chua System
Table 1 , summarized the similarity between extracted secret
speech message and original secret speech corresponding to a
tiny amount of 10" 6 change in one parameters only at a time for
received chaotic key. The similarity is computed using
normalized correlation NC between them according to Eq. 10.
NC =
(10)
where M and M' are original and extracted secret speech
messages respectively, QN represents number of samples in
each one of them [ 16]
Table 1, summarized the similarity between original and
recovered speech.
Parameter
Parameter
changed by
NC
changed by
NC
10" 6
10" 6
Hi
-0.041
yl
-0.0022
a2
-0.0313
y2
-0.0056
a3
0.0034
y3
-0.015
X (O)Lorenz
-0.0416
x (0)chua
-0.0022
y(P) Lorenz
0.061
y(0) Chua
-0.0123
Lorenz
0.013
Z(0) Chua
0.0598
0.0813
°c
0.081
PL
0.0177
Pc
-0.003
PL
0.005
Pc
-0.0029
No parameters changed NC =
1
Table 1, shows highly sensitivity for a tiny change in any
parameters of chaotic key system.
5.2 Test of Steganography Using MA CM:
The Modified Arnold Cat Mapping (MACM) used to
increase and ensure high security implementation for data
hiding in images by introducing new parameters (a, b, c, and p)
used to shuffle the coordinate values of cover image pixel to a
new coordinates corresponding to these parameters and Eq. 9.
The values of MACM parameters will be used in this work
are: a=2, b=3, c=5, and p=3 iteration. Fig. 13 shows the image
generated by using MACM before embedded the encrypted
speech message, the transmitted stego image with secret speech
message, and decrypted speech extracted from received stego
image after applied MACM on it.
Cover Image after Applied MACM
Transmitted Stego Image with secret speech message
Time
Decrypted Speech from Stego Image
Fig. 13 MACM Image, Transmitted Stego Image, and received
Speech.
From Fig. 13, The received speech signal is similar to
transmitted signal shown in Fig. 3 with NC=l at used the same
parameters of MACM and same chaotic key in the received
side. Also, PSNR= 40.35 dB, calculated as in [15], for shown
stego image.
To test the effect of incorrect control parameters of
MACM, the image generated by using MACM at received side
and decrypted speech extracted from it will be shown in Fig.
14 and Fig. 15. In each figure the stego image is processed
with the same chaotic key and same parameters of MACM
except only one parameter is changed at a time as a=3 and c=4,
as example, respectively.
IJER@2015
Page 170
0 10 20 30 40 50 60
Decrypted Speech from Stego Image
Fig. 14 MACM Image with a=3, and received Speech from it.
0 10 20 30 40 50 60
Decrypted Speech from Stego Image
Fig. 15 MACM Image with c=4, and received Speech from it.
From these figures, extracted correct data from stego image
in received side will be highly difficult process without used
same MCAM parameters that is used in transmitted side.
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
5.3 Key Space and System Security:
Key space size is the total number of different keys
that are used in the encryption. The chaotic key used in this
work is highly sensitive to fraction- order for Lorenz (al, a2,
a3) and Chua (yl, y2, y3) systems, Lorenz parameters (a L ,
Pl ? Pl), Chua parameters (a c , Pc ? Pc> and also to
initial values of the system. All parameters and initial
conditions constitute the secret key of encryption system. Also,
the (a, b, c) parameters and p iteration used in MACM to
hiding the encrypted speech are provide addition system
security space. Hence, the space of the key and system, in
general, will be a very high dimensional space. Large secret
key parameters space is very important to resist the exhaustive
attack.
6. Conclusions:
In this paper, fractional derivative order of Lorenz and Chua are
employed as a high dimensional chaotic system to generate more
complex and unpredictable six chaotic sequences. These sequences
used to produce highly complicated security chaotic key can be used
in the secure cryptography and steganography of speech message.
This system has a large key sensitivity because a small change in the
secret key causes a large change in the decrypted signal as shown by
low normalized correlation value when compared the similarity
between extracted secret speech message using incorrect key with
original secret speech. Also, additional security is guaranteed by using
Modified Arnold Cat Map to hiding the speech message in image.
With the use of fractional derivative order as the keys, and Modified
Arnold Cat Map parameters makes the key space expanded and
warranty to high security
References:
i. S. A. Laskar, and K. Hemachandran," Secure Data
Transmission Using Steganography And Encryption Technique",
International Journal on Cryptography and Information Security
(IJCIS), vol2, No.3, pp. 161-172, September 2012.
ii. B. Nagaria, A. Parikh, S. Mandliya, and N. shrivastav, "
Stegano graphic Approach for Data Hiding using LSB Techniques",
International Journal of Advanced Computer Research, vol. 2, No. 4,
pp. 441-445, December 2012.
Hi. R. Nivedhitha, T. Meyyappan, and M. Phil, " Image Security
Using Steganography And Cryptographic Techniques ", International
Journal of Engineering Trends and Technology, vol. 3, pp. 366 - 371,
2012.
iv. S. H. Strogatz, "Nonlinear dynamics and chaos",
PreseusBooks Publishing, LLC, 1994.
v. R. Nicholas, "Introduction to Lorenz' s System of
Equations", Math 6100, December 2003.
vi. K. Sakthidasan, and B. V. Santhosh," A New Chaotic
Algorithm for Image Encryption and Decryption of Digital Color
Images, " International Journal of Information and Education
Technology, vol. 1, No. 2, pp. 137-141, June 2011.
vii. Edward N. Lorenz," Deterministic Nonperiodic
flow", Massachusetts Institute of Technology Journal Of The
Atmospheric Science , Vol.20, 1963.
viii. K. K. Kabi, C. Pradhan, B.J. Saha, and A. Kumar Bisoi, "
Comparative study of image encryption using 2D chaotic map",
Proceedings of IEEE, International Conference of Information
Systems and Computer Networks, pp. 105 - 108, March 2014.
ix. Leon O. Chua, Chai W. Wu& A. Huang, "A Universal
Circuit for Studying and Generating Chaos — Part I: Routes to
Chaos ", Circuits and Systems Fundamental Theory and Applications,
IEEE Transactions, vol.40, pp. 7 32 -7 44, 199 3.
IJER@2015
Page 171
International Journal of Engineering Research
Volume No.4, Issue No.4, pp : 165-172
x. M. Henon 'A Two -Dimensional Mapping With A Strange
Attr actor", Springer -Verlag Communications In Mathematical
Physics, Vol.50, pp. 69 -77, 197 6.
xi. V. Arnold, "mathematical methods of classical mechanics",
springer Graduate Texts in Mathematics, Vol. 60,1985.
xii. Leon O. Chua, "The Genesis of Chua's Circuit", CiteSeerX -
Scientific documents, vol. 46, No. 4, pp. 250-257, 1992.
xiii. K. Sun, and X. Wang, "Bifurcations and Chaos in Fractional
Order Simplified Lorenz System", International Journal of Bifurcation
and chaos, vol. 20, No. 4, pp. 1209-1219, 2010.
ISSN:2319-6890(online),2347-5013(print)
01 April 2015
xiv. M. U. Celik, GSharma, A.M. Tekalp, and E. Saber, "
Lossless generalized -LSB data embedding ", Image Processing, IEEE
Transactions, vol. 14, pp. 253 - 266, 2005
xv. M. Mishra, A. R. Routray, and S. Kumar", High Security
Image Steganography with Modified Arnold's Cat Map ",
International Journal of Computer Applications, vol. 37, No.9, Jane
2012.
xvi. Sreejith.V, Srijith.K, Rajesh Cherian Roy, " Robust Blind
Digital Watermarking in Contourlet Domain ", International Journal
of Computer Applications, vol. 58, No. 12, November 2012.
IJER@2015
Page 172