Skip to main content
Log in

A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Generally, spatial domain and transform domain steganography techniques are used to achieve the covert communication. The main drawback of embedding in frequency domain is rounding error appeared in the embedded secret message. Information is lost when integer pixel values are restored from the frequency domain, causing the embedded message to be distorted. A minor distortion of the embedded message renders extraction impossible and results in loss of embedded secret message. In the present study, a novel imperceptible Discrete Cosine Transform (DCT) and chaotic map based steganographic algorithm for secure communication has been proposed. The proposed method performs an adaptive n-Ary secret data embedding in the higher frequency DCT coefficients and removes the distortion. Additionally, the security of secret data is enhanced using chaotic maps to select the random DCT coefficients for embedding. The experimental results confirm that the proposed technique has high embedding capacity (EC), excellent stego-image quality and capability to withstand against malicious users. To examine security of the proposed method, the key space and key sensitivity parameter were used. Maximum EC = 425,780 bits was achieved with Peak Signal to Noise Ratio (PSNR) = 32.2218, 29.8804, 32.2507, 33.3327, 32.3963 and 31.4936 dB in case of Lena, Baboon, Jetplane, Elaine, Pepper and Boat respectively. The evaluated results show that the proposed method outperforms the existing steganography techniques in terms of EC and PSNR. Additionally, quality of stego image is identified by universal image quality index (Q), Bit Error Rate (BER) and Structural Similarity Index (SSIM).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Fig. 3
Fig. 4
Algorithm 3
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The dataset analysed during the current study is available at USC-SIPI database maintained by the University of Southern California (http://sipi.usc.edu/database/).

References

  1. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99

    CAS  ADS  Google Scholar 

  2. Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426–437

    ADS  Google Scholar 

  3. Bhatti UA, Yu Z, Yuan L, Zeeshan Z, Nawaz SA, Bhatti M, Mehmood A, Ain QU, Wen L (2020) Geometric algebra applications in geospatial artificial intelligence and remote sensing image processing. IEEE Access 8:155783–155796

    Google Scholar 

  4. Bhatti UA, Yu Z, Li J, Nawaz SA, Mehmood A, Zhang K, Yuan L (2020) Hybrid watermarking algorithm using clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access 8:76386–76398

    Google Scholar 

  5. Bhatti UA, Yu Z, Yuan L, Nawaz SA, Aamir M, Bhatti MA (2022) A robust remote sensing image watermarking algorithm based on region-specific SURF. Lecture Notes Networks Syst 350:75–85

    Google Scholar 

  6. Bhowal K, Bhattacharyya D, Pal AJ, Kim TH (2013) A GA based audio steganography with enhanced security. Telecommun Syst 52(4):2197–2220

    Google Scholar 

  7. Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE (2017) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. Stud Comput Intell 660:133–149

    Google Scholar 

  8. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    ADS  Google Scholar 

  9. Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP Journal on Information Security 2009:658047. https://doi.org/10.1155/2009/658047

    Article  Google Scholar 

  10. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752

    Google Scholar 

  11. El Rahman SA (2018) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electric Eng 70:380–399

    MathSciNet  Google Scholar 

  12. Ghosal SK, Mukhopadhyay S, Hossain S, Sarkar R (2021) Exploiting Laguerre transform in image steganography. Comput Electr Eng 89:106964

    Google Scholar 

  13. Hussain M, Wahab AWA, Ho AT, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process: Image Commun 50:44–57

    Google Scholar 

  14. Jafari R, Ziou D, Rashidi MM (2013) Increasing image compression rate using steganography. Expert Syst Appl 40(17):6918–6927

    Google Scholar 

  15. Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302

    MathSciNet  ADS  Google Scholar 

  16. Khan A, Sarfaraz A (2019) Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method. Soft Comput 23(17):8045–8056

    Google Scholar 

  17. Khodaei M, Faez K (2012) New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Proc 6(6):677–686

    Google Scholar 

  18. Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644

    Google Scholar 

  19. Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inform Security Appl 47:94–103

    Google Scholar 

  20. Lee CF, Chen HL (2012) Adjustable prediction-based reversible data hiding. Digital Signal Process 22(6):941–953

    MathSciNet  Google Scholar 

  21. Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41(6):2097–2106

    ADS  Google Scholar 

  22. Lee YP, Lee JC, Chen WK, Chang KC, Su J, Chang CP (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci 191:214–225

    ADS  Google Scholar 

  23. Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Comput Standards Interf 36(5):855–862

    Google Scholar 

  24. Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidimension Syst Signal Process 29(4):1801–1818

    Google Scholar 

  25. Mao Q, Li F, Chang CC (2015) Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf Sci 317:170–180

    Google Scholar 

  26. Martínez-González RF, Díaz-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina R (2016) A steganographic method using Bernoulli’s chaotic maps. Comput Electr Eng 54:435–449

    Google Scholar 

  27. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    ADS  Google Scholar 

  28. Mukherjee S, Sanyal G (2018) A chaos based image steganographic system. Multimedia Tools Appl 77:27851–27876

    Google Scholar 

  29. Mukherjee S, Sanyal G (2019) ‘Edge based image steganography with variable threshold. Multimedia Tools Appl 78(12):16363–16388

    Google Scholar 

  30. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process 53:11–24

    Google Scholar 

  31. Qin C, Chang CC, Lin CC (2015) An adaptive reversible steganographic scheme based on the just noticeable distortion. Multimedia Tools Appl 74(6):1983–2199

    CAS  Google Scholar 

  32. Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools Appl 77(7):8295–8326

    Google Scholar 

  33. Rajaraman V (2016) IEEE standard for floating point numbers. Resonance 21(1):11–30

    Google Scholar 

  34. Rostami MJ et al (2017) A novel parallel image encryption with chaotic windows based on logistic map’. Comput Electr Eng 62:384–400

    Google Scholar 

  35. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology, Gaithersburg, p 131

    Google Scholar 

  36. Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl 76(11):13493–13510

    Google Scholar 

  37. Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131–141

    Google Scholar 

  38. Srinivasu LN, Veeramani V (2022) CNN based “Text in Image” Steganography using Slice Encryption Algorithm and LWT. Optik 265:169398

    ADS  Google Scholar 

  39. Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406–422

    Google Scholar 

  40. Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2):297–306

    Google Scholar 

  41. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inform Security Appl 34:142–151

    Google Scholar 

  42. Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools Appl 78(8):9971–9989

    Google Scholar 

  43. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84

    CAS  ADS  Google Scholar 

  44. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    PubMed  ADS  Google Scholar 

  45. Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569–577

    MathSciNet  Google Scholar 

  46. Wang CC, Chang YF, Chang CC, Jan JK, Lin CC (2014) A high capacity data hiding scheme for binary images based on block patterns. J Syst Softw 93:152–162

    Google Scholar 

  47. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626

    ADS  Google Scholar 

  48. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc-Vision, Image Signal Process 152(5):611–615

    Google Scholar 

  49. Yang C-H, Weng C-Y, Wang S-J, Sun H-M (2010) Varied PVD+ LSB evading detection programs to spatial domain in data embedding systems. J Syst Softw 83:1635–1643

    Google Scholar 

  50. Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimedia Tools Appl 74(24):11163–11186

    Google Scholar 

  51. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Butta Singh.

Ethics declarations

Conflict of interests

No conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, R., Singh, B. A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication. Multimed Tools Appl 83, 20357–20386 (2024). https://doi.org/10.1007/s11042-023-16330-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16330-9

Keywords

Navigation