Skip to main content
Log in

Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

This study investigates the innovative application of Direct Sequence Spread Spectrum (DSSS) technology in the realm of image steganography, known as Spread Spectrum Image Steganography (SSIS). By interpreting the cover image as noise in the communication channel, SSIS capitalizes on the noise-resistant properties of broadband communication systems to effectively conceal information within images. We focus on the development of new classes of spreading sequences with desirable ensemble and correlation properties, which significantly impact the performance of SSIS. We propose a data hiding method that directly addresses spreading sequences, resulting in minimized cover image distortion and heightened resistance to message detection. Furthermore, we explore adaptive spreading sequences that consider the statistical properties of the cover image, substantially reducing error intensity in recovered messages and improving the overall steganographic system performance. Our experiments confirm the advantages of the proposed system and support the theoretical arguments. In addition, we employ artificial neural networks for steganalysis, generating several datasets with varying SSIS payloads and examining the detectability of embedded data using a specially designed convolutional neural network (CNN). While this model demonstrates high effectiveness on other datasets, the detection error probability for SSIS is considerably higher, indicating greater reliability and security even when advanced steganalysis techniques are employed. The findings highlight the potential of SSIS in developing robust and secure communication systems capable of functioning effectively in high-noise environments while preserving the integrity of the cover image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Sklar B, Harris FJ (2020) Digital communications: fundamentals and applications, 3rd edn. Prentice Hall, Hoboken

    Google Scholar 

  2. Torrieri D (2018) Principles of spread-spectrum communication systems. Springer International Publishing

    Book  Google Scholar 

  3. Wei F, Zheng S, Zhou X et al (2022) Detection of direct sequence spread spectrum signals based on deep learning. IEEE Trans Cogn Commun Netw 8:1399–1410. https://doi.org/10.1109/TCCN.2022.3174609

    Article  Google Scholar 

  4. Miller SL (2016) Chapter 10 - Spread spectrum signaling in wireless communications. In: Wilson SK, Wilson S, Biglieri E (eds) Academic Press Library in Mobile and Wireless Communications. Academic Press, Oxford, pp 369–398

    Chapter  Google Scholar 

  5. Stüber GL (2017) Spread spectrum techniques. In: Stüber GL (ed) Principles of mobile communication. Springer International Publishing, Cham, pp 449–499

    Chapter  Google Scholar 

  6. Yang S-MM (2019) Modern digital radio communication signals and systems. Springer International Publishing

    Book  Google Scholar 

  7. Smith JR, Comiskey BO (1996) Modulation and information hiding in images. In: Anderson R (ed) Information hiding. Springer, Berlin, pp 207–226

    Chapter  Google Scholar 

  8. Marvel LM, Boncelet CG, Retter CT (1998) Methodology of spread-spectrum image steganography. Army research lab aberdeen proving ground MD. https://apps.dtic.mil/docs/citations/ADA349102

  9. Wang Y-G, Zhu G, Kwong S, Shi Y-Q (2018) A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans Cybern 48:2307–2320. https://doi.org/10.1109/TCYB.2017.2735989

    Article  Google Scholar 

  10. Eze PU, Parampalli U, Evans RJ, Liu D (2018) Spread spectrum steganographic capacity improvement for medical image security in teleradiology. In: 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). pp 1–4

  11. Sun D, Wu J, Cui H et al (2024) The line-of-sight peak detection and tracking of underwater acoustic DSSS communications in the doubly spread channel. Appl Acoust 216:109761. https://doi.org/10.1016/j.apacoust.2023.109761

    Article  Google Scholar 

  12. Fedorenko V, Samoylenko I, Samoylenko V, Rachkov V (2022) Algorithms for distributing DSSS codes in industrial WSNs with real transmitters and narrow-band interference. AEU-Int J Electron C 154:154307. https://doi.org/10.1016/j.aeue.2022.154307

    Article  Google Scholar 

  13. Darabkh KA, Zomot JN, Al-qudah Z, Khalifeh AF (2022) Impairments-aware time slot allocation model for energy-constrained multi-hop clustered IoT nodes considering TDMA and DSSS MAC protocols. J Ind Inf Integr 25:100243. https://doi.org/10.1016/j.jii.2021.100243

    Article  Google Scholar 

  14. Ma C, Zhang L (2018) A Viterbi algorithm for blind estimation of periodic long-code DSSS signals. In: 2018 2nd IEEE Advanced Information Management, Communicates,Electronic and Automation Control Conference (IMCEC), pp 128–132

  15. Wang X, Liu X, Chen H-H, Meng W (2020) Complementary coded CDMA systems with CP-Free OFDM. IEEE Trans Veh Technol 69:11515–11528. https://doi.org/10.1109/TVT.2020.3013155

    Article  Google Scholar 

  16. Chen D, Wang Q, Wang J et al (2022) Performance evaluation of ZCC and OZCZ code set in an integrated VLCP-CDMA system. IEEE Photonics Technol Lett 34:846–849. https://doi.org/10.1109/LPT.2022.3164702

    Article  Google Scholar 

  17. Rezaie M, Dosaranian-Moghadam M, Bakhshi H, Bibalan MH (2023) Achievable rates and resource allocation for CDMA-based overlay cognitive radio with RF energy harvesting. IEEE Syst J 17:1137–1145. https://doi.org/10.1109/JSYST.2022.3171557

    Article  Google Scholar 

  18. (2022) IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks–Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Corrigendum 1 – Correct IEEE 802.11ay Assignment of Protected Announce Support bit. IEEE Std 80211–2020/Cor 1–2022 (Corrigendum to IEEE Std 80211–2020 as amended by IEEE Std 80211ax-2021, IEEE Std 80211ay-2021, and IEEE Std 80211ba-2021) 1–18. https://doi.org/10.1109/IEEESTD.2022.9999411

  19. Mahmud MdH, Hossain MDM, Khan AA et al (2020) Performance Analysis of OFDM, W-OFDM and F-OFDM Under Rayleigh Fading Channel for 5G Wireless Communication. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp 1172–1177

  20. An C, Ryu H-G (2020) Spectrum efficient multidimensional OFDM-CDIM communication system. In: 2020 23rd International Symposium on Wireless Personal Multimedia Communications (WPMC), pp 1–4

  21. El-Rayis AO, Arslan T, Erdogan AT (2010) A processing engine for GPS correlation. In: 2010 IEEE 8th Symposium on Application Specific Processors (SASP), pp 44–49

  22. Torrieri D (2015) Chapter 10 detection of spread-spectrum signals. In: Torrieri D (ed) Principles of spread-spectrum communication systems. Springer International Publishing, Cham, pp 565–594

    Chapter  Google Scholar 

  23. Marvel LM (2000) Image steganography for hidden communication. Army research lab aberdeen proving ground MD. https://doi.org/10.1007/978-3-319-14096-4_10

  24. Brundick FS, Marvel LM (2001) Implementation of Spread Spectrum Image Steganography: Defense Technical Information Center, Fort Belvoir. https://doi.org/10.21236/ADA392155

  25. Boncelet JCG, Marvel LM, Retter CT (2003) Spread Spectrum Image Steganography | Unified Patents

  26. Estudillo-Valdez M-A, Adeyemi V-A, Nuñez-Perez J-C (2024) FPGA realization of an image encryption system using the DCSK-CDMA technique. Integration 96:102157. https://doi.org/10.1016/j.vlsi.2024.102157

    Article  Google Scholar 

  27. Bailey CP, Pados DA (2022) Principal component signatures for correlation-and-bit-aware spread spectrum steganography. In: Signal Processing, Sensor/Information Fusion, and Target Recognition XXXI. SPIE, pp 332–336

  28. Bailey CP, Chamadia S, Pados DA (2020) An alternative signature design using L1 principal components for spread-spectrum steganography. In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2693–2696

  29. Nassrullah HA, Flayyih WN, Nasrullah MA (2020) Enhancement of LSB audio steganography based on carrier and message characteristics. J Inf Hiding Multimed Signal Process 11:126–137

    Google Scholar 

  30. Akbay K, Konyar MZ, İlkın S, Sondaş A (2018) Data hiding using shuffle algorithm and LSB method. In: 2018 26th Signal Processing and Communications Applications Conference (SIU), pp 1–4

  31. Qin J, Luo Y, Xiang X et al (2019) Coverless image steganography: a survey. IEEE Access 7:171372–171394. https://doi.org/10.1109/ACCESS.2019.2955452

    Article  Google Scholar 

  32. Yahya A (2019) Steganography techniques. In: Yahya A (ed) Steganography techniques for digital images. Springer International Publishing, Cham, pp 9–42

    Chapter  Google Scholar 

  33. Krishnan AA, Chandran CS, Kamal S, Supriya MH (2017) Spread spectrum based encrypted audio steganographic system with improved security. In: 2017 International Conference on Circuits, Controls, and Communications (CCUBE), pp 109–114

  34. Wei L, Wu G, Hu RQ (2015) Sum-capacity optimal spread-spectrum data hiding in video streams. In: 2015 IEEE International Conference on Communications (ICC), pp 7407–7412

  35. Rachmawanto EH, Setiadi DRIM, Sari CA et al (2019) Spread embedding technique in LSB image steganography based on chaos theory. In: 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), pp 1–6. https://doi.org/10.1109/ISEMANTIC.2019.8884266

  36. Salih NM, Mohamadi SA, Haji LM, Ahmed OM (2021) Implementation of steganography in speech signal using spread spectrum modulation and differential method in wireless communication systems. In: 2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), pp 213–218. https://doi.org/10.1109/ICASEA53739.2021.9733069

  37. Zhenchao J, Zhao F, Xiaoqiang Z (2016) Improved additive spread spectrum watermarking method. https://lens.org/197-103-387-005-304

  38. Ge G, Kang Z, Yi C et al (2015) Interleaved additive spread spectrum audio watermark embedding method and detection method and system

  39. Jeremy G, John DD (2015) Mobile Benutzerauthentifizierung Mit Hilfe Einer Anruferidentifizierung

  40. Kuznetsov A, Onikiychuk A, Peshkova O et al (2022) Direct spread spectrum technology for data hiding in audio. Sensors 22:3115. https://doi.org/10.3390/s22093115

    Article  Google Scholar 

  41. Kuznetsov A, Smirnov O, Arischenko A et al (2020) Pseudorandom sequences for spread spectrum image steganography. In: Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019. CEUR-WS.org, pp 122–131

  42. Kuznetsov A, Kiian A, Kuznetsova K, Smirnov A (2020) Data hiding scheme based on spread sequence addressing. In: Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ITEM 2020), Kherson, Ukraine, October 15–16, 2020, pp 44–58

  43. Kuznetsov A, Smirnov O, Kovalchuk D, Kuznetsova T (2020) New technique for data hiding in cover images using adaptively generated pseudorandom sequences. In: Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019. CEUR-WS.org, pp 1–14

  44. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

    Article  MathSciNet  Google Scholar 

  45. Bykov K, Kazakov L, Selyanskaya E (2020) Signal-code design for spread spectrum channels with packet errors occuring. In: 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), pp 1–5

  46. Kim G, Song H-Y, Lim DW (2019) Some constructions of truncated Gold codes for GNSS. In: 2019 International Conference on Information and Communication Technology Convergence (ICTC), pp 1231–1233

  47. Xiao L, Xuan G, Wu Y (2018) Research on an improved chaotic spread spectrum sequence. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp 420–423

  48. Kuznetsov A, Smirnov A, Kovalchuk D, Kuznetsova T (2020) New Technique for hiding data using adaptively generated pseudorandom sequences. In: Proceedings of the 16th International Conference on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. Volume II: Workshops, Kharkiv, Ukraine, October 06–10, 2020, pp 214–227

  49. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8:1075–1083. https://doi.org/10.1109/83.777088

    Article  Google Scholar 

  50. Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14:1181–1193. https://doi.org/10.1109/TIFS.2018.2871749

    Article  Google Scholar 

  51. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp 234–239

  52. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp 4206–4210

  53. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014:1. https://doi.org/10.1186/1687-417X-2014-1

    Article  Google Scholar 

  54. Ipatov VP (2005) Spread spectrum and CDMA: principles and applications. Wiley, Chichester

    Book  Google Scholar 

  55. Welch L (1974) Lower bounds on the maximum cross correlation of signals (Corresp.). IEEE Trans Inf Theory 20:397–399. https://doi.org/10.1109/TIT.1974.1055219

    Article  Google Scholar 

  56. Massey JL, Mittelholzer T (1993) Welch’s bound and sequence sets for code-division multiple-access systems. In: Capocelli R, De Santis A, Vaccaro U (eds) Sequences II. Springer, New York, pp 63–78

    Chapter  Google Scholar 

  57. Hamid M, Miller A (2000) Gold code generators in virtex devices. https://ieeexplore.ieee.org/abstract/document/1055219. Accessed 1 Aug 2020

  58. Kuznetsov A, Rajba SA, Veselska O et al (2022) Codes for multiple-access asynchronous techniques. Procedia Comput Sci 207:2192–2201. https://doi.org/10.1016/j.procs.2022.09.279

    Article  Google Scholar 

  59. Karpenko O, Kuznetsov A, Sai V, Stasev Y (2012) Discrete signals with multi-level correlation function. TRE 71:. https://doi.org/10.1615/TelecomRadEng.v71.i1.100

  60. Kuznetsov A, Smirnov O, Kovalchuk D et al (2019) Discrete signals with special correlation properties. In: Luengo D, Subbotin S, Arras P et al (eds) Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Zaporizhzhia, Ukraine, April 15–19, 2019. CEUR-WS.org, pp 618–629

  61. Kuznetsov A, Smirnov O, Reshetniak O et al (2019) Generators of pseudorandom sequence with multilevel function of correlation. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S T), pp 517–522

Download references

Funding

• This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No. 101007820—TRUST. This publication reflects only the author’s view and the REA is not responsible for any use that may be made of the information it contains.

• This research was funded by the European Union – NextGenerationEU under the Italian Ministry of University and Research (MIUR), National Innovation Ecosystem grant ECS00000041-VITALITY-CUP D83C22000710005.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed equally to this work.

Corresponding author

Correspondence to Oleksandr Kuznetsov.

Ethics declarations

• I declare that the authors have no competing financial interests, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

• The results/data/figures in this manuscript have not been published elsewhere, nor are they under consideration (from you or one of your Contributing Authors) by another publisher.

• All of the material is owned by the authors and/or no permissions are required.

Human and animal rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

Mentioned authors have no conflict of interest in this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kuznetsov, O., Frontoni, E. & Chernov, K. Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography. Appl Intell (2024). https://doi.org/10.1007/s10489-024-05415-z

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10489-024-05415-z

Keywords

Navigation