Advertisement

A physical equation based image steganography with electro-magnetic embedding

  • Srilekha MukherjeeEmail author
  • Goutam Sanyal
Article
  • 24 Downloads

Abstract

Steganography is adjudged to be a boon in the field of global conveyance of sensitive information. In this paper, a novel approach is proffered where all the ensued methods are epitomized in the dimensions of physics. The cardinal aim is to promote data hiding in terms of the explicit arena of applicability concerning physics. The initial step proceeds with the application of Motion Scrambling procedure. This is done by customizing the Power Modulus Scrambling (PMS) method in such a way that it uses some of the illustrious conventions from physics to procreate unique focal values. These values, in turn administer the scrambling methodology. The Electro-magnetic insertion technique then exerts specific salient formulations that efficaciously aid and expedite the mechanism of infusing secret bits. All the principles from the physics domain are elected with discreet observation. The followed experimental results show moderate competence and adeptness of the proposed work in terms of distinct benchmarking metrics, both quantitative and qualitative.

Keywords

Steganography Motion scrambling Electro-magnetic insertion Peak signal to noise ratio (PSNR) Structural similarity index measure (SSIM) 

Notes

References

  1. 1.
    Ahmad T, Abdullah M (2009) A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering 3:1Google Scholar
  2. 2.
    Almohammad A, Ghinea G (2010) Stego-image quality and the reliability of PSNR. Int Conf on Image Processing Theory, Tools and Applications. IEEEGoogle Scholar
  3. 3.
    Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2018) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 1–40Google Scholar
  4. 4.
    Atawneh S, Almomani A, Bazar H et al (2016) Secure and imperceptible digital image Steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472Google Scholar
  5. 5.
    Banerjee I, Bhattacharyya S, Sanyal G (2013) Hiding & analyzing data in image using extended PMM, international conference on computational intelligence: modeling techniques and applications (CIMTA). Procedia Technol (10):157–166Google Scholar
  6. 6.
    Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76:16529–16562CrossRefGoogle Scholar
  7. 7.
    Bao l, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k,n)-secret image sharing. IEEE Trans Image Process 26:5618–5631MathSciNetCrossRefGoogle Scholar
  8. 8.
    Bhattacharyya S, Sanyal G (2012) Study and analysis of quality of service in different image based steganography using pixel mapping method. International Journal of Applied Information Systems (UAIS)-ISSN: 2249-0868:42–57Google Scholar
  9. 9.
    Chandramouli R, Kharrazi M, Memon N (2003) Image steganography and Steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM (eds) IWDW. Springer, pp 35–49Google Scholar
  10. 10.
    Dukkipati A (2012) On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl Math Comput 218:11674–11687MathSciNetzbMATHGoogle Scholar
  11. 11.
    El-Alfy E, Al-Sadi A (2011) A comparative study of PVD-based schemes for data hiding in digital images. In: Siegel HJ, El-Kadi A (eds) AICCSA. IEEE Computer Society, pp 144–149Google Scholar
  12. 12.
    Feng J, Zhang J, Zhu X et al (2017) A novel chaos optimization algorithm. Multimed Tools Appl 76:17405–17436CrossRefGoogle Scholar
  13. 13.
    Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. In: Astola J, Egiazarian KO (eds) Proc. SPIE 7532, image processing: algorithms and systems VIIIGoogle Scholar
  14. 14.
    Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheysCrossRefGoogle Scholar
  15. 15.
    Hansen B (2015) The integrated mean squared error of series regression and a Rosenthal Hilbert-space inequality. Econ Theory 31:337–361MathSciNetCrossRefGoogle Scholar
  16. 16.
    He J, Lan W, Tang S (2017) A secure image sharing scheme with high quality stego-images based on steganography. Multimed Tools Appl 76:7677–7698CrossRefGoogle Scholar
  17. 17.
    Hiary H, Sabri KH, Mohammed M (2016) A hybrid steganography system based on LSB matching and replacement. Int J Adv Comput Sci Appl 7(9):374–380Google Scholar
  18. 18.
    Huang P, Chang KC, Chang CP, Tu TM (2008) A novel image steganography method using tri-way pixel value differencing. J Multimed 3:37–44CrossRefGoogle Scholar
  19. 19.
    Jain R, Kumar N (2012) Efficient data hiding scheme using lossless data compression and image steganography. Int J Eng Sci Technol 4(8):3908–3915Google Scholar
  20. 20.
    Kanan H, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130CrossRefGoogle Scholar
  21. 21.
    Khalifa O, Harding SH, Hashim AHA (2008) Compression using wavelet transform. Signal Processing: An International Journal 2(5):17–26Google Scholar
  22. 22.
    Koo H, Cho N (2013) Skew estimation of natural images based on a salient line detector. J Electron Imaging 22(1):013020Google Scholar
  23. 23.
    Li Q, Fang YM, Xu JT (2016) A novel spatial pooling strategy for image quality assessment. J Comput Sci Technol 31:225–234CrossRefGoogle Scholar
  24. 24.
    Li J, Yu C, Gupta BB et al (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561Google Scholar
  25. 25.
    Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214CrossRefGoogle Scholar
  26. 26.
    Luo W, Huang F, Huang J (2010) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools App 52(2-3):407–430Google Scholar
  27. 27.
    Muhammad K, Ahmad J, Rho S, Baik S (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76:18985–19004CrossRefGoogle Scholar
  28. 28.
    Mukherjee S, Sanyal G (2015) A novel image steganographic technique using position power first mapping (PPFM). IEEE international conference on research in computational intelligence and communication networks (ICRCICN), pp 406–410Google Scholar
  29. 29.
    Mukherjee S, Sanyal G (2017) Enhanced position power first mapping (PPFM) based image steganography. Int J Comput Appl 39:59–68. Taylor and FrancisGoogle Scholar
  30. 30.
    Mukherjee S, Sanyal G (2018) A chaos based image steganographic system. Multimed Tools Appl 77(21):27851–27876. SpringerCrossRefGoogle Scholar
  31. 31.
    Mukherjee S, Ash S, Sanyal G (2015) A novel image steganographic methodology by power Modulus scrambling with logistic mapping. TENCON, IEEE region 10 conferenceGoogle Scholar
  32. 32.
    Mukherjee S, Ash S, Sanyal G (2015) A novel differential Calculus based image steganography with crossover. International Journal of Computer, Control, Quantum and Information Engineering 9(4) World Academy of Science, Engineering and Technology (WASET)Google Scholar
  33. 33.
    Mukherjee S, Ash S, Sanyal G (2015) A novel image Steganographic approach by pixel position Modulus method (PPMM). Computing for sustainable global development (INDIACom)Google Scholar
  34. 34.
    Phad S, Bhosale S, Panhalkar R (2012) A novel security scheme for secret data using cryptography and steganography. International Journal of Computer Network and Information Security 2:36–42Google Scholar
  35. 35.
    Potdar V, Chang E (2004) Gray level modification steganography for secret communication. IEEE international conference on industrial informatics, Berlin, Germany, pp 355–368Google Scholar
  36. 36.
    Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. CoRRabs 1601.00299Google Scholar
  37. 37.
    Solemani S, Taherinia A (2017) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76:20847–20867CrossRefGoogle Scholar
  38. 38.
    Tomar G (2012) Effect of noise on image steganography based on LSB insertion and RSA encryption. IOSR Journal of Engineering 2(3):473–477CrossRefGoogle Scholar
  39. 39.
    Wang Z, Bovik A, Sheik H et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612CrossRefGoogle Scholar
  40. 40.
    Wang G, Yan W, Kankanhalli MS (2016) Content based authentication of visual cryptography. Multimed Tools Appl 76:9427–9441CrossRefGoogle Scholar
  41. 41.
    Wang I, Huang S, Lee K et al (2016) Data extraction via histogram and arithmetic mean queries: fundamental limits and algorithms. IEEE International Symposium on Information Theory, pp 1383–1390Google Scholar
  42. 42.
    Xue W (2013) Study on digital image scrambling algorithm. JNW 8:1673–1679Google Scholar
  43. 43.
    Yang C, Weng C, Wang S et al (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3:488–497CrossRefGoogle Scholar
  44. 44.
    Yu C, Li J, Li X et al (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology DurgapurDurgapurIndia

Personalised recommendations