Multimedia Tools and Applications

, Volume 76, Issue 18, pp 18985–19004 | Cite as

Image steganography for authenticity of visual contents in social networks

  • Khan Muhammad
  • Jamil Ahmad
  • Seungmin Rho
  • Sung Wook Baik
Article

Abstract

Social networks are major sources of image sharing and secret messaging among the people. To date, such networks are not strictly bounded by copyright laws due to which image sharing, secret messaging, and its authentication is vulnerable to many risks. In addition to this, maintaining the confidentiality, integrity, and authenticity of secret messages is an open challenge of today’s communication systems. Steganography is one of the solutions to tackle these problems. This paper proposes a secure crystographic framework for authenticity of visual contents using image steganography, utilizing color model transformation, three-level encryption algorithm (TLEA), and Morton scanning (MS)-directed least significant bit (LSB) substitution. The method uses I-plane of the input image in HSI for secret data embedding using MS-directed LSB substitution method. Furthermore, the secret data is encrypted using TLEA prior to embedding, adding an additional level of security for secure authentication. The qualitative and quantitative results verify the better performance of the proposed scheme and provide one of the best mechanisms for authenticity of visual contents in social networks.

Keywords

Information security Authenticity of visual contents Steganography Multimedia security Crystography 

References

  1. 1.
    Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal and Image Processing 1:196–204Google Scholar
  2. 2.
    Al-Otaibi NA, Gutub AA (2014a) 2-Leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2:151–157Google Scholar
  3. 3.
    Al-Otaibi NA, Gutub AA (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), pp 250–256Google Scholar
  4. 4.
    Amirtharajan R, Archana P, Rajesh V, Devipriya G, Rayappan J, (2013) Standard deviation converges for random image steganography. In: Information & Communication Technologies (ICT), 2013 I.E. Conference on, 2013, pp 1064–1069Google Scholar
  5. 5.
    Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimedia Tools and Applications 30:55–88CrossRefGoogle Scholar
  6. 6.
    Buke A, Gaoli F, Yongcai W, Lei S, Zhiqi Y (2015) Healthcare algorithms by wearable inertial sensors: a survey. Communications, China 12:1–12CrossRefGoogle Scholar
  7. 7.
    Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752CrossRefMATHGoogle Scholar
  8. 8.
    Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301CrossRefGoogle Scholar
  9. 9.
    Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995–2007CrossRefMATHGoogle Scholar
  10. 10.
    Grover N, Mohapatra A, (2013a) Digital Image Authentication Model Based on Edge Adaptive Steganography. In: Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, 2013, pp 238–242Google Scholar
  11. 11.
    Grover N, Mohapatra A, (2013b) Digital image authentication model based on edge adaptive steganography. In: 2013 2nd International Conference on Advanced Computing, Networking and Security, pp 238–242Google Scholar
  12. 12.
    Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2:56–64Google Scholar
  13. 13.
    Gutub A, (2015) Social Media & its Impact on e-governance. ME Smart Cities 2015-4th Middle East Smart Cities SummitGoogle Scholar
  14. 14.
    Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A, (2008) Pixel indicator high capacity technique for RGB image based Steganography. In WoSPA 2008-5th IEEE International Workshop on Signal Processing and its ApplicationsGoogle Scholar
  15. 15.
    Hamza R, Titouna F, (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 1–18. doi:10.1080/19393555.2016.1212954
  16. 16.
    Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524CrossRefGoogle Scholar
  17. 17.
    Jan Z, Mirza AM (2012) Genetic programming-based perceptual shaping of a digital watermark in the wavelet domain using Morton scanning. J Chin Inst Eng 35:85–99CrossRefGoogle Scholar
  18. 18.
    Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130CrossRefGoogle Scholar
  19. 19.
    Karim M, (2011) A new approach for LSB based image steganography using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011), pp 286–291Google Scholar
  20. 20.
    Ker AD (2005) A general framework for structural steganalysis of LSB replacement. Information Hiding 2005:296–311CrossRefGoogle Scholar
  21. 21.
    Liu Z, Zhang F, Wang J, Wang H, Huang J (2015) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157–166CrossRefGoogle Scholar
  22. 22.
    Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214CrossRefGoogle Scholar
  23. 23.
    Mehmood I, Sajjad M, Baik SW (2014) Mobile-cloud assisted video summarization framework for efficient Management of Remote Sensing Data Generated by wireless capsule sensors. Sensors 14:17112–17145CrossRefGoogle Scholar
  24. 24.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287CrossRefGoogle Scholar
  25. 25.
    Mstafa RJ, Elleithy KM (2016a) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications 75:10311–10333CrossRefGoogle Scholar
  26. 26.
    Mstafa RJ, Elleithy KM, (2016b) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools and Applications 1–38. doi:10.1007/s11042-016-4055-1
  27. 27.
    Muhammad K, Ahmad J, Rehman NU, Jan Z, Qureshi RJ (2015a) A secure cyclic steganographic technique for color images using randomization. Technical Journal, University of Engineering and Technology Taxila 19:57–64Google Scholar
  28. 28.
    Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015b) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962Google Scholar
  29. 29.
    Muhammad K, Ahmad J, Sajjad M, Zubair M (2015c) Secure image steganography using cryptography and image transposition. NED Univ J Res 12:81–91Google Scholar
  30. 30.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016a) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75:14867–14893CrossRefGoogle Scholar
  31. 31.
    Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M, (2016b) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications 1–30. doi:10.1007/s11042-016-3383-5
  32. 32.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW, (2016c) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Generation Computer Systems. doi:10.1016/j.future.2016.11.029
  33. 33.
    Muhammad K, Sajjad M, Baik SW (2016d) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16CrossRefGoogle Scholar
  34. 34.
    Muhammad K, Ahmad J, Sajjad M, Baik SW (2016e) Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems. Springer Plus 5:1495CrossRefGoogle Scholar
  35. 35.
    Muhammad K, Sajjad M, Lee MY, Baik SW (2017) Efficient visual attention driven framework for key frames extraction from hysteroscopy videos. Biomed Signal Process Control 33:161–168CrossRefGoogle Scholar
  36. 36.
    Parvez MT and Gutub AA-A (2008) RGB intensity based variable-bits image steganography. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE, pp 1322–1327Google Scholar
  37. 37.
    Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142Google Scholar
  38. 38.
    Patsakis C, Zigomitros A, Papageorgiou A, Solanas A (2015) Privacy and security for multimedia content shared on OSNs: issues and countermeasures. Comput J 58:518–535CrossRefGoogle Scholar
  39. 39.
    Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB < sup > ++</sup>. Inf Sci 277:90–101CrossRefGoogle Scholar
  40. 40.
    Sheikh HR, Wang Z, Bovik AC, Cormack L (2003) Image and video quality assessment research at LIVEGoogle Scholar
  41. 41.
    Swain G, Lenka SK (2012) A novel approach to RGB Channel based image steganography technique. Int Arab J e-Technol 2:181–186Google Scholar
  42. 42.
    Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-International Journal for Light and Electron Optics 125(15):3972–3976. doi:10.1016/j.ijleo.2014.01.149
  43. 43.
    Wu N-I, Hwang M-S (2007) Data hiding: current status and key issues. IJ Network Security 4:1–9Google Scholar
  44. 44.
    Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626CrossRefMATHGoogle Scholar
  45. 45.
    Zhou W, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Intelligent Media Laboratory, Digital Contents Research Institute, College of Electronics and Information EngineeringSejong UniversitySeoulRepublic of Korea
  2. 2.Department of Media SoftwareSungkyul UniversityAnyangRepublic of Korea

Personalised recommendations