Abstract
This study investigates the innovative application of Direct Sequence Spread Spectrum (DSSS) technology in the realm of image steganography, known as Spread Spectrum Image Steganography (SSIS). By interpreting the cover image as noise in the communication channel, SSIS capitalizes on the noise-resistant properties of broadband communication systems to effectively conceal information within images. We focus on the development of new classes of spreading sequences with desirable ensemble and correlation properties, which significantly impact the performance of SSIS. We propose a data hiding method that directly addresses spreading sequences, resulting in minimized cover image distortion and heightened resistance to message detection. Furthermore, we explore adaptive spreading sequences that consider the statistical properties of the cover image, substantially reducing error intensity in recovered messages and improving the overall steganographic system performance. Our experiments confirm the advantages of the proposed system and support the theoretical arguments. In addition, we employ artificial neural networks for steganalysis, generating several datasets with varying SSIS payloads and examining the detectability of embedded data using a specially designed convolutional neural network (CNN). While this model demonstrates high effectiveness on other datasets, the detection error probability for SSIS is considerably higher, indicating greater reliability and security even when advanced steganalysis techniques are employed. The findings highlight the potential of SSIS in developing robust and secure communication systems capable of functioning effectively in high-noise environments while preserving the integrity of the cover image.
Similar content being viewed by others
Data availability
The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
Sklar B, Harris FJ (2020) Digital communications: fundamentals and applications, 3rd edn. Prentice Hall, Hoboken
Torrieri D (2018) Principles of spread-spectrum communication systems. Springer International Publishing
Wei F, Zheng S, Zhou X et al (2022) Detection of direct sequence spread spectrum signals based on deep learning. IEEE Trans Cogn Commun Netw 8:1399–1410. https://doi.org/10.1109/TCCN.2022.3174609
Miller SL (2016) Chapter 10 - Spread spectrum signaling in wireless communications. In: Wilson SK, Wilson S, Biglieri E (eds) Academic Press Library in Mobile and Wireless Communications. Academic Press, Oxford, pp 369–398
Stüber GL (2017) Spread spectrum techniques. In: Stüber GL (ed) Principles of mobile communication. Springer International Publishing, Cham, pp 449–499
Yang S-MM (2019) Modern digital radio communication signals and systems. Springer International Publishing
Smith JR, Comiskey BO (1996) Modulation and information hiding in images. In: Anderson R (ed) Information hiding. Springer, Berlin, pp 207–226
Marvel LM, Boncelet CG, Retter CT (1998) Methodology of spread-spectrum image steganography. Army research lab aberdeen proving ground MD. https://apps.dtic.mil/docs/citations/ADA349102
Wang Y-G, Zhu G, Kwong S, Shi Y-Q (2018) A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans Cybern 48:2307–2320. https://doi.org/10.1109/TCYB.2017.2735989
Eze PU, Parampalli U, Evans RJ, Liu D (2018) Spread spectrum steganographic capacity improvement for medical image security in teleradiology. In: 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). pp 1–4
Sun D, Wu J, Cui H et al (2024) The line-of-sight peak detection and tracking of underwater acoustic DSSS communications in the doubly spread channel. Appl Acoust 216:109761. https://doi.org/10.1016/j.apacoust.2023.109761
Fedorenko V, Samoylenko I, Samoylenko V, Rachkov V (2022) Algorithms for distributing DSSS codes in industrial WSNs with real transmitters and narrow-band interference. AEU-Int J Electron C 154:154307. https://doi.org/10.1016/j.aeue.2022.154307
Darabkh KA, Zomot JN, Al-qudah Z, Khalifeh AF (2022) Impairments-aware time slot allocation model for energy-constrained multi-hop clustered IoT nodes considering TDMA and DSSS MAC protocols. J Ind Inf Integr 25:100243. https://doi.org/10.1016/j.jii.2021.100243
Ma C, Zhang L (2018) A Viterbi algorithm for blind estimation of periodic long-code DSSS signals. In: 2018 2nd IEEE Advanced Information Management, Communicates,Electronic and Automation Control Conference (IMCEC), pp 128–132
Wang X, Liu X, Chen H-H, Meng W (2020) Complementary coded CDMA systems with CP-Free OFDM. IEEE Trans Veh Technol 69:11515–11528. https://doi.org/10.1109/TVT.2020.3013155
Chen D, Wang Q, Wang J et al (2022) Performance evaluation of ZCC and OZCZ code set in an integrated VLCP-CDMA system. IEEE Photonics Technol Lett 34:846–849. https://doi.org/10.1109/LPT.2022.3164702
Rezaie M, Dosaranian-Moghadam M, Bakhshi H, Bibalan MH (2023) Achievable rates and resource allocation for CDMA-based overlay cognitive radio with RF energy harvesting. IEEE Syst J 17:1137–1145. https://doi.org/10.1109/JSYST.2022.3171557
(2022) IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks–Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Corrigendum 1 – Correct IEEE 802.11ay Assignment of Protected Announce Support bit. IEEE Std 80211–2020/Cor 1–2022 (Corrigendum to IEEE Std 80211–2020 as amended by IEEE Std 80211ax-2021, IEEE Std 80211ay-2021, and IEEE Std 80211ba-2021) 1–18. https://doi.org/10.1109/IEEESTD.2022.9999411
Mahmud MdH, Hossain MDM, Khan AA et al (2020) Performance Analysis of OFDM, W-OFDM and F-OFDM Under Rayleigh Fading Channel for 5G Wireless Communication. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp 1172–1177
An C, Ryu H-G (2020) Spectrum efficient multidimensional OFDM-CDIM communication system. In: 2020 23rd International Symposium on Wireless Personal Multimedia Communications (WPMC), pp 1–4
El-Rayis AO, Arslan T, Erdogan AT (2010) A processing engine for GPS correlation. In: 2010 IEEE 8th Symposium on Application Specific Processors (SASP), pp 44–49
Torrieri D (2015) Chapter 10 detection of spread-spectrum signals. In: Torrieri D (ed) Principles of spread-spectrum communication systems. Springer International Publishing, Cham, pp 565–594
Marvel LM (2000) Image steganography for hidden communication. Army research lab aberdeen proving ground MD. https://doi.org/10.1007/978-3-319-14096-4_10
Brundick FS, Marvel LM (2001) Implementation of Spread Spectrum Image Steganography: Defense Technical Information Center, Fort Belvoir. https://doi.org/10.21236/ADA392155
Boncelet JCG, Marvel LM, Retter CT (2003) Spread Spectrum Image Steganography | Unified Patents
Estudillo-Valdez M-A, Adeyemi V-A, Nuñez-Perez J-C (2024) FPGA realization of an image encryption system using the DCSK-CDMA technique. Integration 96:102157. https://doi.org/10.1016/j.vlsi.2024.102157
Bailey CP, Pados DA (2022) Principal component signatures for correlation-and-bit-aware spread spectrum steganography. In: Signal Processing, Sensor/Information Fusion, and Target Recognition XXXI. SPIE, pp 332–336
Bailey CP, Chamadia S, Pados DA (2020) An alternative signature design using L1 principal components for spread-spectrum steganography. In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2693–2696
Nassrullah HA, Flayyih WN, Nasrullah MA (2020) Enhancement of LSB audio steganography based on carrier and message characteristics. J Inf Hiding Multimed Signal Process 11:126–137
Akbay K, Konyar MZ, İlkın S, Sondaş A (2018) Data hiding using shuffle algorithm and LSB method. In: 2018 26th Signal Processing and Communications Applications Conference (SIU), pp 1–4
Qin J, Luo Y, Xiang X et al (2019) Coverless image steganography: a survey. IEEE Access 7:171372–171394. https://doi.org/10.1109/ACCESS.2019.2955452
Yahya A (2019) Steganography techniques. In: Yahya A (ed) Steganography techniques for digital images. Springer International Publishing, Cham, pp 9–42
Krishnan AA, Chandran CS, Kamal S, Supriya MH (2017) Spread spectrum based encrypted audio steganographic system with improved security. In: 2017 International Conference on Circuits, Controls, and Communications (CCUBE), pp 109–114
Wei L, Wu G, Hu RQ (2015) Sum-capacity optimal spread-spectrum data hiding in video streams. In: 2015 IEEE International Conference on Communications (ICC), pp 7407–7412
Rachmawanto EH, Setiadi DRIM, Sari CA et al (2019) Spread embedding technique in LSB image steganography based on chaos theory. In: 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), pp 1–6. https://doi.org/10.1109/ISEMANTIC.2019.8884266
Salih NM, Mohamadi SA, Haji LM, Ahmed OM (2021) Implementation of steganography in speech signal using spread spectrum modulation and differential method in wireless communication systems. In: 2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), pp 213–218. https://doi.org/10.1109/ICASEA53739.2021.9733069
Zhenchao J, Zhao F, Xiaoqiang Z (2016) Improved additive spread spectrum watermarking method. https://lens.org/197-103-387-005-304
Ge G, Kang Z, Yi C et al (2015) Interleaved additive spread spectrum audio watermark embedding method and detection method and system
Jeremy G, John DD (2015) Mobile Benutzerauthentifizierung Mit Hilfe Einer Anruferidentifizierung
Kuznetsov A, Onikiychuk A, Peshkova O et al (2022) Direct spread spectrum technology for data hiding in audio. Sensors 22:3115. https://doi.org/10.3390/s22093115
Kuznetsov A, Smirnov O, Arischenko A et al (2020) Pseudorandom sequences for spread spectrum image steganography. In: Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019. CEUR-WS.org, pp 122–131
Kuznetsov A, Kiian A, Kuznetsova K, Smirnov A (2020) Data hiding scheme based on spread sequence addressing. In: Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ITEM 2020), Kherson, Ukraine, October 15–16, 2020, pp 44–58
Kuznetsov A, Smirnov O, Kovalchuk D, Kuznetsova T (2020) New technique for data hiding in cover images using adaptively generated pseudorandom sequences. In: Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019. CEUR-WS.org, pp 1–14
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
Bykov K, Kazakov L, Selyanskaya E (2020) Signal-code design for spread spectrum channels with packet errors occuring. In: 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), pp 1–5
Kim G, Song H-Y, Lim DW (2019) Some constructions of truncated Gold codes for GNSS. In: 2019 International Conference on Information and Communication Technology Convergence (ICTC), pp 1231–1233
Xiao L, Xuan G, Wu Y (2018) Research on an improved chaotic spread spectrum sequence. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp 420–423
Kuznetsov A, Smirnov A, Kovalchuk D, Kuznetsova T (2020) New Technique for hiding data using adaptively generated pseudorandom sequences. In: Proceedings of the 16th International Conference on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. Volume II: Workshops, Kharkiv, Ukraine, October 06–10, 2020, pp 214–227
Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8:1075–1083. https://doi.org/10.1109/83.777088
Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14:1181–1193. https://doi.org/10.1109/TIFS.2018.2871749
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp 234–239
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp 4206–4210
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014:1. https://doi.org/10.1186/1687-417X-2014-1
Ipatov VP (2005) Spread spectrum and CDMA: principles and applications. Wiley, Chichester
Welch L (1974) Lower bounds on the maximum cross correlation of signals (Corresp.). IEEE Trans Inf Theory 20:397–399. https://doi.org/10.1109/TIT.1974.1055219
Massey JL, Mittelholzer T (1993) Welch’s bound and sequence sets for code-division multiple-access systems. In: Capocelli R, De Santis A, Vaccaro U (eds) Sequences II. Springer, New York, pp 63–78
Hamid M, Miller A (2000) Gold code generators in virtex devices. https://ieeexplore.ieee.org/abstract/document/1055219. Accessed 1 Aug 2020
Kuznetsov A, Rajba SA, Veselska O et al (2022) Codes for multiple-access asynchronous techniques. Procedia Comput Sci 207:2192–2201. https://doi.org/10.1016/j.procs.2022.09.279
Karpenko O, Kuznetsov A, Sai V, Stasev Y (2012) Discrete signals with multi-level correlation function. TRE 71:. https://doi.org/10.1615/TelecomRadEng.v71.i1.100
Kuznetsov A, Smirnov O, Kovalchuk D et al (2019) Discrete signals with special correlation properties. In: Luengo D, Subbotin S, Arras P et al (eds) Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Zaporizhzhia, Ukraine, April 15–19, 2019. CEUR-WS.org, pp 618–629
Kuznetsov A, Smirnov O, Reshetniak O et al (2019) Generators of pseudorandom sequence with multilevel function of correlation. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S T), pp 517–522
Funding
• This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No. 101007820—TRUST. This publication reflects only the author’s view and the REA is not responsible for any use that may be made of the information it contains.
• This research was funded by the European Union – NextGenerationEU under the Italian Ministry of University and Research (MIUR), National Innovation Ecosystem grant ECS00000041-VITALITY-CUP D83C22000710005.
Author information
Authors and Affiliations
Contributions
All authors contributed equally to this work.
Corresponding author
Ethics declarations
• I declare that the authors have no competing financial interests, or other interests that might be perceived to influence the results and/or discussion reported in this paper.
• The results/data/figures in this manuscript have not been published elsewhere, nor are they under consideration (from you or one of your Contributing Authors) by another publisher.
• All of the material is owned by the authors and/or no permissions are required.
Human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of interest
Mentioned authors have no conflict of interest in this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kuznetsov, O., Frontoni, E. & Chernov, K. Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography. Appl Intell (2024). https://doi.org/10.1007/s10489-024-05415-z
Accepted:
Published:
DOI: https://doi.org/10.1007/s10489-024-05415-z