Abstract
Generally, spatial domain and transform domain steganography techniques are used to achieve the covert communication. The main drawback of embedding in frequency domain is rounding error appeared in the embedded secret message. Information is lost when integer pixel values are restored from the frequency domain, causing the embedded message to be distorted. A minor distortion of the embedded message renders extraction impossible and results in loss of embedded secret message. In the present study, a novel imperceptible Discrete Cosine Transform (DCT) and chaotic map based steganographic algorithm for secure communication has been proposed. The proposed method performs an adaptive n-Ary secret data embedding in the higher frequency DCT coefficients and removes the distortion. Additionally, the security of secret data is enhanced using chaotic maps to select the random DCT coefficients for embedding. The experimental results confirm that the proposed technique has high embedding capacity (EC), excellent stego-image quality and capability to withstand against malicious users. To examine security of the proposed method, the key space and key sensitivity parameter were used. Maximum EC = 425,780 bits was achieved with Peak Signal to Noise Ratio (PSNR) = 32.2218, 29.8804, 32.2507, 33.3327, 32.3963 and 31.4936 dB in case of Lena, Baboon, Jetplane, Elaine, Pepper and Boat respectively. The evaluated results show that the proposed method outperforms the existing steganography techniques in terms of EC and PSNR. Additionally, quality of stego image is identified by universal image quality index (Q), Bit Error Rate (BER) and Structural Similarity Index (SSIM).
Similar content being viewed by others
Data availability
The dataset analysed during the current study is available at USC-SIPI database maintained by the University of Southern California (http://sipi.usc.edu/database/).
References
Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99
Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426–437
Bhatti UA, Yu Z, Yuan L, Zeeshan Z, Nawaz SA, Bhatti M, Mehmood A, Ain QU, Wen L (2020) Geometric algebra applications in geospatial artificial intelligence and remote sensing image processing. IEEE Access 8:155783–155796
Bhatti UA, Yu Z, Li J, Nawaz SA, Mehmood A, Zhang K, Yuan L (2020) Hybrid watermarking algorithm using clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access 8:76386–76398
Bhatti UA, Yu Z, Yuan L, Nawaz SA, Aamir M, Bhatti MA (2022) A robust remote sensing image watermarking algorithm based on region-specific SURF. Lecture Notes Networks Syst 350:75–85
Bhowal K, Bhattacharyya D, Pal AJ, Kim TH (2013) A GA based audio steganography with enhanced security. Telecommun Syst 52(4):2197–2220
Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. Stud Comput Intell 660:133–149
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP Journal on Information Security 2009:658047. https://doi.org/10.1155/2009/658047
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752
El Rahman SA (2018) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electric Eng 70:380–399
Ghosal SK, Mukhopadhyay S, Hossain S, Sarkar R (2021) Exploiting Laguerre transform in image steganography. Comput Electr Eng 89:106964
Hussain M, Wahab AWA, Ho AT, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process: Image Commun 50:44–57
Jafari R, Ziou D, Rashidi MM (2013) Increasing image compression rate using steganography. Expert Syst Appl 40(17):6918–6927
Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302
Khan A, Sarfaraz A (2019) Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method. Soft Comput 23(17):8045–8056
Khodaei M, Faez K (2012) New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Proc 6(6):677–686
Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644
Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inform Security Appl 47:94–103
Lee CF, Chen HL (2012) Adjustable prediction-based reversible data hiding. Digital Signal Process 22(6):941–953
Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41(6):2097–2106
Lee YP, Lee JC, Chen WK, Chang KC, Su J, Chang CP (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci 191:214–225
Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Comput Standards Interf 36(5):855–862
Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidimension Syst Signal Process 29(4):1801–1818
Mao Q, Li F, Chang CC (2015) Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf Sci 317:170–180
Martínez-González RF, Díaz-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina R (2016) A steganographic method using Bernoulli’s chaotic maps. Comput Electr Eng 54:435–449
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Mukherjee S, Sanyal G (2018) A chaos based image steganographic system. Multimedia Tools Appl 77:27851–27876
Mukherjee S, Sanyal G (2019) ‘Edge based image steganography with variable threshold. Multimedia Tools Appl 78(12):16363–16388
Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process 53:11–24
Qin C, Chang CC, Lin CC (2015) An adaptive reversible steganographic scheme based on the just noticeable distortion. Multimedia Tools Appl 74(6):1983–2199
Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools Appl 77(7):8295–8326
Rajaraman V (2016) IEEE standard for floating point numbers. Resonance 21(1):11–30
Rostami MJ et al (2017) A novel parallel image encryption with chaotic windows based on logistic map’. Comput Electr Eng 62:384–400
Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology, Gaithersburg, p 131
Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl 76(11):13493–13510
Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131–141
Srinivasu LN, Veeramani V (2022) CNN based “Text in Image” Steganography using Slice Encryption Algorithm and LWT. Optik 265:169398
Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406–422
Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2):297–306
Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inform Security Appl 34:142–151
Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools Appl 78(8):9971–9989
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569–577
Wang CC, Chang YF, Chang CC, Jan JK, Lin CC (2014) A high capacity data hiding scheme for binary images based on block patterns. J Syst Softw 93:152–162
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc-Vision, Image Signal Process 152(5):611–615
Yang C-H, Weng C-Y, Wang S-J, Sun H-M (2010) Varied PVD+ LSB evading detection programs to spatial domain in data embedding systems. J Syst Softw 83:1635–1643
Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimedia Tools Appl 74(24):11163–11186
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
No conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kaur, R., Singh, B. A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication. Multimed Tools Appl 83, 20357–20386 (2024). https://doi.org/10.1007/s11042-023-16330-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16330-9