Skip to main content

A Hybrid Image Steganography Method Based on Spectral and Spatial Domain with High Hiding Ratio

  • Conference paper
  • First Online:
Intelligent Systems Design and Applications (ISDA 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 715))

  • 242 Accesses

Abstract

The internet's global data communication has made data transfer both simple and dangerous. The security of data transferred over the Internet is a major concern nowadays. Steganography is a popular method for preventing unauthorized access to data. This paper proposes a three-level secured hybrid image steganography method with increased payload by embedding secret data bits in both the spectral and spatial domains. First, the cover and secret image are encrypted using the permutation order (PO) generated by the initial keys (First Level security), and then the cover image is converted using DCT and random DCT blocks are selected using key values to embed the secret data (Second Level security). Finally, the remaining secret data bits are embedded at random locations specified by the key values in the LSB planes (Third Level security). The method achieves a PSNR of 35.86 dB and a hiding ratio of 50% (4bpp), according to the performance results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ranjithkumar, R., Ganeshkumar, D., Senthamilarasu, S.: Efficient and secure data hiding in video sequence with three-layer security: an approach using chaos. Multimed Tools Appl., 80, 13865–13878 (2021)

    Google Scholar 

  2. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76(11), 13493–13510 (2016). https://doi.org/10.1007/s11042-016-3722-6

    Article  Google Scholar 

  3. Ranjith Kumar, R., Jayasudha, S., Pradeep, S.: Efficient and secure data hiding in encrypted images: a new approach using chaos. Inf. Secur. J. Glob. Perspect. 25(4–6), 235–246 (2016). https://doi.org/10.1080/19393555.2016.1248582

    Article  Google Scholar 

  4. Patel, R., Lad, K., Patel, M.: Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis. Int. J. Inf. Technol. 14, 1649–1657 (2022). https://doi.org/10.1007/s41870-021-00788-7

  5. Kaur, R., Singh, B.: A hybrid algorithm for robust image steganography. Multidimens. Syst. Signal Process. (2020). https://doi.org/10.1007/s11045-020-00725-0

  6. Sharif, A., Mollaeefar, M., Nazari, M.: A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools Appl. 76(6), 7849–7867 (2016). https://doi.org/10.1007/s11042-016-3398-y

    Article  Google Scholar 

  7. Valandar, M.Y., Barani, M.J., Ayubi, P., Aghazadeh, M.: An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools Appl. 78(8), 9971–9989 (2018). https://doi.org/10.1007/s11042-018-6584-2

    Article  Google Scholar 

  8. Parah, S.A., Sheikh, J.A., Assad, U.I., Bhat, G.M.: Hiding in encrypted images: a three tier security data hiding technique. Multidimension. Syst. Signal Process. 28(2), 549–572 (2015). https://doi.org/10.1007/s11045-015-0358-z

    Article  MATH  Google Scholar 

  9. Gajabe, R., Ali, S.T.: Secret key-based image steganography in spatial domain Int. J. Image Graph. 22(02). https://doi.org/10.1142/S0219467822500140

  10. Thiyagarajan, P., Natarajan, V., Aghila, G., et al.: Pattern based 3D image Steganography. 3D Res. 4, 1 (2013). https://doi.org/10.1007/3DRes.01(2013)1

  11. Zhou, R.-G., Luo, J., Liu, X., Zhu, C., Wei, L., Zhang, X.: A novel quantum image steganography scheme based on LSB. Int. J. Theor. Phys. 57(6), 1848–1863 (2018). https://doi.org/10.1007/s10773-018-3710-x

    Article  MathSciNet  MATH  Google Scholar 

  12. Miri, A., Faez, K.: An image steganography method based on integer wavelet transform. Multimedia Tools Appl. 77(11), 13133–13144 (2017). https://doi.org/10.1007/s11042-017-4935-z

    Article  Google Scholar 

  13. AbdelRaouf, A.: A new data hiding approach for image steganography based on visual color sensitivity. Multimedia Tools Appl. 80(15), 23393–23417 (2021). https://doi.org/10.1007/s11042-020-10224-w

    Article  Google Scholar 

  14. Hussain, M., Riaz, Q., Saleem, S., Ghafoor, A., Jung, K.-H.: Enhanced adaptive data hiding method using LSB and pixel value differencing. Multimedia Tools Appl. 80(13), 20381–20401 (2021). https://doi.org/10.1007/s11042-021-10652-2

    Article  Google Scholar 

  15. Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to Steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9, 1966–1974 (2018). https://doi.org/10.1016/j.asej.2017.02.003

    Article  Google Scholar 

  16. Siddiqui, T.J., Khare, A.: Chaos-based video steganography method in discrete cosine transform domain. Int. J. Image Graph. (2020). https://doi.org/10.1142/s0219467821500157

    Article  Google Scholar 

  17. Alipour, M.C., Gerardo, B.D., Medina, R.P.: LSB substitution image steganography based on randomized pixel selection and one-time pad encryption. In: 2020 2nd International Conference on Big-Data Service and Intelligent Computation (2020). https://doi.org/10.1145/3440054.3440055

  18. The USC-SIPI Image Database. http://sipi.usc.edu/database. Accessed 12 June 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, D., Sudha, V.K. (2023). A Hybrid Image Steganography Method Based on Spectral and Spatial Domain with High Hiding Ratio. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 715. Springer, Cham. https://doi.org/10.1007/978-3-031-35507-3_7

Download citation

Publish with us

Policies and ethics