Skip to main content
Log in

Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption

  • Published:
Annals of Data Science Aims and scope Submit manuscript

Abstract

To address the need for secure digital image transmission an algorithm that fulfils all prominent prerequisites of a steganography technique is developed. By incorporating the salient features of fractal cover images, dual-layer encryption using the standard chaotic map and DNA-hyperchaotic cryptography along with DWT-SVD embedding, key aspects like robustness, better perceptual quality and high payload capacity are targeted to build a blind colour image steganography algorithm in this work. A fractal cover image is used to hide a DNA-chaotic encrypted colour image using DWT-SVD embedding method. A two-dimensional standard chaotic map, which exhibits robust chaos for a very large range of parameter, is used to generate the pseudo-random number sequences of cryptographic qualities. One of the core novelty of the proposed method is the 2 layers chaotic encryption method to generate the DNA encrypted secret image which is finally embedded in a fractal cover image using DWT-SVD transform domain technique capable of withstanding the false positive attack. The comprehensive statistical security tests and the standard evaluation benchmarks depict that this efficient yet simple hybrid steganography algorithm is highly robust as well as sustainable against removal, geometrical, image enhancement and histogram attacks, offers better perceptual image quality and also contributes high perceptual quality of the extracted image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig.5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Shi Y (2022) Advances in Big Data Analytics: Theory, Algorithm and Practice, Springer, Singapore.

  2. Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin, New York

    Google Scholar 

  3. Valandar M, Ayubi P, Barani M (2017) A New Transform Domain Steganography Based on Modified Logistic Chaotic Map for Color Images. Information Security and Applications 34:142–151. https://doi.org/10.1016/j.jisa.2017.04.004

    Article  Google Scholar 

  4. Yang L, Jindong Z (2020) A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding. Multimedia Tools and Applications 79(29–30):21579–21601. https://doi.org/10.1007/s11042-020-08880-z

    Article  Google Scholar 

  5. Shi Y, Tian YJ, Kou G, Peng Y, Li JP (2011) Optimization based data mining: theory and applications. Springer, Berlin

    Book  Google Scholar 

  6. Gutub A, Al-Shaarani F (2020) Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons. Arab J Sci Eng 45:2631–2644. https://doi.org/10.1007/s13369-020-04413-w

    Article  Google Scholar 

  7. Cheddad A, Condell J, KCurran, Kevitt PM, (2009) Digital Image Steganography: Survey and Analysis of Current Methods. Signal Process 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  Google Scholar 

  8. Swain G (2019) Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution. Arab J SciEng 44:2995–3004. https://doi.org/10.1007/s13369-018-3372-2

    Article  Google Scholar 

  9. Tien JM (2017) Internet of things, real-time decision making, and artificial intelligence. Ann Data Sci 4(2):149–178

    Article  Google Scholar 

  10. Zhan K, Dong W, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imaging 26(1):013021. https://doi.org/10.1117/1.JEI.26.1.013021

    Article  Google Scholar 

  11. Romany FM, Elsaid M (2019) A An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. MultidimSyst Sign Process 30:791–814. https://doi.org/10.1007/s11045-018-0575-3

    Article  Google Scholar 

  12. Ghada H, Marey M, Sayed S, Tolba M (2016) Comparative Study for Various DNA Based Steganography Techniques with the Essential Conclusions about the Future Research. Proceedings of IEEE, International Conference on Computer Engineering and Systems. Pp: 220–225. https://doi.org/10.1109/ICCES.2016.7822003

  13. Patidar V, Pareek N, Purohit G (2018) A Novel Quasigroup Substitution Scheme for Chaos Based Image Encryption. Applied Nonlinear Dynamics 7(4):393–412. https://doi.org/10.5890/JAND.2018.12.007

    Article  Google Scholar 

  14. Patidar V, Sud K (2009) A Novel Pseudo Random Bit Generator Based on Chaotic Standard Map and its Testing. Electron J Theor Phys 6(20):327–344

    Google Scholar 

  15. Durafe A, Patidar V (2020) Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover. Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2020.10.008

    Article  Google Scholar 

  16. Valandar M, Barani M, Ayubi P, Aghazadeh M (2018) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools and Applications 78:9971–9989. https://doi.org/10.1007/s11042-018-6584-2

    Article  Google Scholar 

  17. Meena K, Menaka K, Subramanian RK (2016) Secure Message Transfer Using DNA Sequences. J Comput Intell Bioinforma 9(1):1–6

    Google Scholar 

  18. Khalifa A, Elhadad A, Hamad S (2016) Secure Blind Data Hiding into Pseudo DNA Sequences Using Playfair Ciphering and Generic Complementary Substitution. Appl Math Inf sci 10(4):1483–1492

    Article  Google Scholar 

  19. Santoso K et al (2016) Sector based DNA information hiding method. Security and Communication Networks 9(17):4210–4226. https://doi.org/10.1002/sec.1599

    Article  Google Scholar 

  20. Mumthas S, Lijiya, (2017) A Transform Domain Video Steganography Using RSA, Random DNA Encryption and Huffman Encoding. Procedia Computer Science 115:660–666. https://doi.org/10.1016/j.procs.2017.09.152

    Article  Google Scholar 

  21. Anbarasi L, Jani G, Mala A, Modigari N (2015) DNA Based Multi-Secret Image Sharing. Procedia Computer Science 46:1794–1801. https://doi.org/10.1016/j.procs.2015.02.135

    Article  Google Scholar 

  22. Halagowda S, Lakshminarayana S (2017) Image Encryption Method Based on Hybrid Fractal-Chaos Algorithm. International Journal of Intelligent Engineering and Systems.10:221–229. https://doi.org/10.22266/ijies2017.1231.24

  23. Wu Y, Noonan JP (2012) Image Steganography Scheme Using Chaos and Fractals with the Wavelet Transform. International Journal of Innovation, Management and Technology 3:285–289

    Google Scholar 

  24. Subhedar M, Mankar V (2014) Current Status and Key Issues in Image Steganography: A Survey. Computer Science Review. I3-I4:95–113

  25. Jero SE, Ramu P, Ramakrishnan S (2014) Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission. J Med Syst 38:132. https://doi.org/10.1007/s10916-014-0132-z

    Article  Google Scholar 

  26. Singh D, Singh S (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76:13001–13024. https://doi.org/10.1007/s11042-016-3706-6

    Article  Google Scholar 

  27. Kominek J (1995) Algorithm for Fast Fractal Image Compression, Proceedings of SPIE - The International Society for Optical Engineering. 2419

  28. Kaur R, Singh B (2020) A hybrid algorithm for robust image steganography. MultidimSyst Sign Process. https://doi.org/10.1007/s11045-020-00725-0

    Article  Google Scholar 

  29. Kaur G, Agarwal R, Patidar V (2020) Chaos based multiple order optical transform for 2D image encryption. Engineering Science and Tecgnology, an international journal 23:998–1014. https://doi.org/10.1016/j.jestch.2020.02.007

    Article  Google Scholar 

  30. Naik RB, Singh U (2022) A Review on Applications of Chaotic Maps in Pseudo-Random Number Generators and Encryption. Ann Data Sci. https://doi.org/10.1007/s40745-021-00364-7

    Article  Google Scholar 

  31. Chokri N, Guennoun ZA (2019) A Pseudo Random Bit Generator Based on a Modified Chaotic Map International Journal of Network Security 21(3):402–408. https://doi.org/10.6633/IJNS.201905

    Article  Google Scholar 

  32. Misbahuddin M (2017) An Efficient Solution for Remote User Authentication Using DNA Crypto and Steganography. Int'l Conf. Security and Management, SAM'18. 91:399–404

  33. Panda D, Molla K, Baig A, Swain M J, Behera A D, Dash M (2018) DNA as a digital information storage device: hope or hype? 3 Biotech, 8(5):239, https://doi.org/10.1007/s13205-018-1246-7

  34. Ahmadi SB, Zhang BG, Wei S (2020) Robust and hybrid SVD-based image watermarking schemes: A survey. Multimedia Tools and Applications 79:1075–1117. https://doi.org/10.1007/s11042-019-08197-6

    Article  Google Scholar 

  35. Thakral S, Manhas P (2018) Image Processing by Using Different Types of Discrete Wavelet Transform. Intl. conf. Advanced Informatics for Computing Research 499–507. https://doi.org/10.1007/978-981-13-3140-4_45

  36. Steve JL (1996) Linear Algebra with Applications. Macmillan Publishing Company, New York

    Google Scholar 

  37. Khare P, Srivastava VK (2021) A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain. Multidimension Syst Signal Process 32(1):131–160. https://doi.org/10.1007/s11045-020-00732-1

    Article  Google Scholar 

  38. Sajjad BBA, Gongxuan Z, Songjie W (2020) Robust and hybrid SVD-based image watermarking schemes: A survey. Multimedia Tools and Applications 79(1–2):1075–1117. https://doi.org/10.1007/s11042-019-08197-6

    Article  Google Scholar 

  39. Ahmad T, Holil M, Wibisono W, IRoyyana M ( 2013) An improved Quad and RDE-based medical data hiding method. In: International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) 141–145

  40. www.mathworks.com/help

  41. Fu Y, Wang S (2016) A No Reference Image Quality Assessment Metric Based on Visual Perception MDPI Journal 9(4):87. https://doi.org/10.3390/a9040087

    Article  Google Scholar 

  42. www.sipi.usc.edu/databases/

  43. Mohammed A, Fadhil A H (2015) Image Steganography Method Preserves the Histogram Shape of Image, European Journal of Scientific Research ISSN 1450–216X / 1450–202X 130:101–106. http://www.europeanjournalofscientificresearch.com

  44. https://csrc.nist.gov/projects/random-bit-generation/documentation-and-software

  45. Luo T, Jiang G, Yu M, Xu H, Gao W (2018) Sparse recovery based reversible data hiding method using the human visual system. Multimedia Tools Applications 77:19027–19050. https://doi.org/10.1007/s11042-017-5356-8

    Article  Google Scholar 

  46. Shah PD, Bichkar R (2021) Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure. Engineering Science and Technology, an International Journal 24:782–794

    Article  Google Scholar 

  47. Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik (Stuttg) 145:158–168. https://doi.org/10.1016/j.ijleo.2017.07.043

    Article  Google Scholar 

  48. Qin C, Chang C, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23:1109–1118. https://doi.org/10.1109/TCSVT.2012.2224052

    Article  Google Scholar 

  49. Hamid N, Yahya A, Ahmad R B, Al-Qershi O (2012) Characteristic region based image steganography using Speeded-Up robust features technique, in: Proceedings of the 2012 International Conference on Future Communication Networks pp. 141–146. https://doi.org/10.1109/ICFCN.2012.6206858

Download references

Funding

One of us (VP) has received the MATRICS Grant (MTR/2018/000203) from the Science and Engineering Research Board (SERB), Department of Science and Technology, Government of India.

Author information

Authors and Affiliations

Authors

Contributions

Have made a substantial contribution to the concept or design of the article; or the acquisition, analysis, or interpretation of data for the article; AND 2. Helped in drafting the article or revised it critically for important intellectual content.

Corresponding author

Correspondence to Asha Durafe.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Durafe, A., Patidar, V. Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption. Ann. Data. Sci. (2022). https://doi.org/10.1007/s40745-022-00457-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s40745-022-00457-x

Keywords

Navigation