Multimedia Tools and Applications

, Volume 76, Issue 6, pp 8597–8626 | Cite as

CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method

  • Khan Muhammad
  • Jamil Ahmad
  • Naeem Ur Rehman
  • Zahoor Jan
  • Muhammad Sajjad
Article

Abstract

Information hiding is an active area of research where secret information is embedded in innocent-looking carriers such as images and videos for hiding its existence while maintaining their visual quality. Researchers have presented various image steganographic techniques since the last decade, focusing on payload and image quality. However, there is a trade-off between these two metrics and keeping a better balance between them is still a challenging issue. In addition, the existing methods fail to achieve better security due to direct embedding of secret data inside images without encryption consideration, making data extraction relatively easy for adversaries. Therefore, in this work, we propose a secure image steganographic framework based on stego key-directed adaptive least significant bit (SKA-LSB) substitution method and multi-level cryptography. In the proposed scheme, stego key is encrypted using a two-level encryption algorithm (TLEA); secret data is encrypted using a multi-level encryption algorithm (MLEA), and the encrypted information is then embedded in the host image using an adaptive LSB substitution method, depending on secret key, red channel, MLEA, and sensitive contents. The quantitative and qualitative experimental results indicate that the proposed framework maintains a better balance between image quality and security, achieving a reasonable payload with relatively less computational complexity, which confirms its effectiveness compared to other state-of-the-art techniques.

Keywords

Image steganography Information security Image quality LSB Stego key Multimedia security Data hiding 

References

  1. 1.
    Al-Taani AT, Al-Issa AM (2009) A novel steganographic method for gray-level images. Int J Comput, Inform Syst Sci, Eng 3: 1 2009Google Scholar
  2. 2.
    Aziz M, Tayarani-N MH, Afsar M (2015) A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn 80:1271–1290CrossRefGoogle Scholar
  3. 3.
    Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimed Tools Appl 30:55–88CrossRefGoogle Scholar
  4. 4.
    Bin L, Ming W, Xiaolong L, Shunquan T, Jiwu H (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10:1905–1917CrossRefGoogle Scholar
  5. 5.
    Chai T, Draxler RR (2014) Root mean square error (RMSE) or mean absolute error (MAE)?–Arguments against avoiding RMSE in the literature. Geosci Model Dev 7:1247–1250CrossRefGoogle Scholar
  6. 6.
    Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752CrossRefMATHGoogle Scholar
  7. 7.
    Cheddad A, Condell J, Curran K, Mckevitt P (2014) Encryption method. ed: Google PatentsGoogle Scholar
  8. 8.
    Chen W-Y (2008) Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl Math Comput 196:40–54MathSciNetMATHGoogle Scholar
  9. 9.
    Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301CrossRefGoogle Scholar
  10. 10.
    Chen P-Y, Lin H-J (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4:275–290Google Scholar
  11. 11.
    Cheng W-C, Pedram M (2004) Chromatic encoding: a low power encoding technique for digital visual interface. IEEE Trans Consum Electron 50:320–328CrossRefGoogle Scholar
  12. 12.
    El Hennawy HM, Omar AE, Kholaif SM (2015) LEA: link encryption algorithm proposed stream cipher algorithm. Ain Shams Eng J 6:57–65CrossRefGoogle Scholar
  13. 13.
    El-Emam NN (2015) New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. Comput Secur 55:21–45CrossRefGoogle Scholar
  14. 14.
    Emam NNE, Diabat MA (2015) A novel algorithm for colour image steganography using a new intelligent technique based on three phases. Appl Soft ComputGoogle Scholar
  15. 15.
    Eng PMKM, Zaynab Najeeb Abdulhameed (2014) High capacity steganography based on chaos and contourlet transform for hiding multimedia data. Int J Electron Comm Eng Technol (IJECET) 5:26–42Google Scholar
  16. 16.
    Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J Electron Imaging 22:043007CrossRefGoogle Scholar
  17. 17.
    Grover N, Mohapatra A (2013) Digital image authentication model based on edge adaptive steganography. In: Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, p 238–242Google Scholar
  18. 18.
    Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2:56–64Google Scholar
  19. 19.
    Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inform Sci 221:473–489CrossRefGoogle Scholar
  20. 20.
    Hong W, Chen T-S (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7:176–184CrossRefGoogle Scholar
  21. 21.
    Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524CrossRefGoogle Scholar
  22. 22.
    Ishtiaq M, Jaffar MA, Khan MA, Jan Z, Mirza AM (2009) Robust and imperceptible watermarking of video streams for low power devices. In: Signal Processing, Image Processing and Pattern Recognition, ed: Springer, p 177–184Google Scholar
  23. 23.
    Jassim FA (2013) A novel steganography algorithm for hiding text in image using five modulus method. Int J ComputAppl 72Google Scholar
  24. 24.
    Jiang N, Zhao N, Wang L (2015) LSB based quantum image steganography algorithm. Int J Theor Phys, p 1–17Google Scholar
  25. 25.
    Jinomeiq L, Baoduui W, Xinmei W (2007) One AES S-box to increase complexity and its cryptanalysis. J Syst Eng Electron 18:427–433CrossRefGoogle Scholar
  26. 26.
    Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130CrossRefGoogle Scholar
  27. 27.
    Khan Muhammad IM, Sajjad M, Ahmad J, Yoo SJ, Han D, Baik SW (2015) Secure visual content labelling for personalized image retrieval. In: The 11th International Conference on Multimedia Information Technology and Applications (MITA 2015) June 30-July2, 2015, Tashkent, Uzbekistan, p 165–166Google Scholar
  28. 28.
    Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inform Sci 279:251–272CrossRefGoogle Scholar
  29. 29.
    Lee Y-P, Lee J-C, Chen W-K, Chang K-C, Su I-J, Chang C-P (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inform Sci 191:214–225CrossRefGoogle Scholar
  30. 30.
    Liu Q, Li P-y, Zhang M-c, Sui Y-x, Yang H-j (2015) A novel image encryption algorithm based on chaos maps with Markov properties. Commun Nonlinear Sci Numer Simul 20:506–515CrossRefMATHGoogle Scholar
  31. 31.
    Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214CrossRefGoogle Scholar
  32. 32.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287CrossRefGoogle Scholar
  33. 33.
    Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII T Internet Inf 9:1938–1962Google Scholar
  34. 34.
    Muhammad K, Ahmad J, Rehman NU, Jan Z, Qureshi RJ (2015) A secure cyclic steganographic technique for color images using randomization. Technical Journal UET Taxila, Pakistan 19(3):57–64Google Scholar
  35. 35.
    Muhammad K, Ahmad J, Sajjad M, Zubair M (2015) Secure image steganography using cryptography and image transposition. NED Univ J Res 12(4):81Google Scholar
  36. 36.
    Muhammad K, Jan Z, Ahmad J, Khan Z (2015) An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks. Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan 20(3):48--53Google Scholar
  37. 37.
    Muhammad K, Mehmood I, Lee MY, Ji SM, Baik SW (2015) Ontology-based secure retrieval of semantically significant visual contents. J Kor Inst Next Gener Comput 11(3):87--96Google Scholar
  38. 38.
    Muhammad K, Mehmood I, Sajjad M, Ahmad J, Yoo SJ, Han D, Wook S (2015) Secure visual content labelling for personalized image retrieval. In: The 11th international conference on multimedia information technology and applications (MITA 2015), 2015, Tashkent, Uzbekistan, pp 165--166Google Scholar
  39. 39.
    Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40:1--16Google Scholar
  40. 40.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2015) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl:1–27Google Scholar
  41. 41.
    NguyenTD, Arch-int S, Arch-int N (2015) An adaptive multi bit-plane image steganography using block data-hiding. Multimed Tools Appl:1–27,Google Scholar
  42. 42.
    Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: TENCON 2009–2009 I.E. Region 10 Conference, p 1–4Google Scholar
  43. 43.
    Noda H, Niimi M, Kawaguchi E (2006) High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn Lett 27:455–461CrossRefGoogle Scholar
  44. 44.
    Parah SA, Sheikh JA, Hafiz AM, Bhat G (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40:70–82CrossRefGoogle Scholar
  45. 45.
    Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142Google Scholar
  46. 46.
    Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inform Sci 277:90–101MathSciNetCrossRefGoogle Scholar
  47. 47.
    Roy R, Sarkar A, Changder S (2013) Chaos based edge adaptive image steganography. Procedia Technol 10:138–146CrossRefGoogle Scholar
  48. 48.
    Sajjad M, Mehmood I, Abbas N, Baik SW (2016) Basis pursuit denoising-based image superresolution using a redundant set of atoms. SIViP 10(1):181--188Google Scholar
  49. 49.
    Sajjad M, Mehmood I, Baik SW (2014) Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network. Sensors 14:3652–3674CrossRefGoogle Scholar
  50. 50.
    Tang M, Zeng S, Chen X, Hu J, Du Y (2015) An adaptive image steganography using AMBTC compression and Interpolation Technique. Op-Int J Light Electron OptGoogle Scholar
  51. 51.
    Wang C-M, Wu N-I, Tsai C-S, Hwang M-S (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158CrossRefGoogle Scholar
  52. 52.
    Wu S, Liu Y, Zhong S, Liu Y (2015) What makes the stego image undetectable?. In Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, p 47Google Scholar
  53. 53.
    Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626CrossRefMATHGoogle Scholar
  54. 54.
    Zhang W, Zhang X, Wang S (2007) A double layered “plus-minus one” data embedding scheme. IEEE Signal Process Lett 14:848–851CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Khan Muhammad
    • 1
    • 2
  • Jamil Ahmad
    • 1
    • 2
  • Naeem Ur Rehman
    • 2
  • Zahoor Jan
    • 2
  • Muhammad Sajjad
    • 2
  1. 1.Digital Contents Research InstituteSejong UniversitySeoulRepublic of Korea
  2. 2.Department of Computer ScienceIslamia College PeshawarPeshawarPakistan

Personalised recommendations