Skip to main content
Log in

Improving Steganographic capacity using distributed steganography over BMP

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Our research area tackles the improvement of private data security using our proposed Steganographic method called DSoBMP-I (Distributed Steganography over BMP faze I) to improve the issues of low capacity, high detectability and distortion. The methodology consists of a new distributed steganographic approach to minimise the main weaknesses of today’s methods, including Discrete Cosine Transform, where the capacity, detectability and distortion needs an upgrade to accommodate securer steganography for our data protection. The proposed prototype approach that evolved after a few experiments using our distributed steganographic method, where secrete data is secure into a set of BMP files (as it is proven more reliable), originates from a raw file that is not necessarily a BMP at the start. After applying a layer of encryption for extra security using two different methods such as RC4 & RSA, comparing the two encryption techniques for its agility and extra security to address the issue of low capacity and better security using the DSoBMP-I method, all deriving from the supplied image. The overall achievement was improved capacity that doubles as the set of BMP images increases, less distortion and detectability as secrete data stays among different files.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Al-Turfi M (2012) Text realisation image steganography. Int J Eng 6(1):1–9

    Google Scholar 

  2. Antony N (2015) Improved capacity college steganography using discrete cosine transformation. Int J Sci Eng Res 6(11):1060–1064

    Google Scholar 

  3. Bisk (2017) The History of Information Security. Available: https://www.villanovau.com/resources/iss/history-of-information-security/#.WPSEv_nyuM9.

  4. Borse D, Patil S (2015) Review on transform domain Steganographic techniques (DCT & DWT). Int J Innov Res Comput Commun Eng 3(12):12466–12473

    Google Scholar 

  5. Britanak V, Yip PC (2006) Discrete cosine and sine transforms general properties, fast algorithms and integer approximations. Elsevier, San Diego

    Google Scholar 

  6. Chandramoulia R, Memon N (2015) Steganography capacity: A Steganalysis perspective. A Department of E.C.E. Stevens Inst Technol 1(1):1–5

    Google Scholar 

  7. Chen J, Chen TS, Hong W, Lin CN, Wu MC, Wu HY (2013) A space increased reversible information hiding technique by reducing redundant recording. Procedia Comput Sci 17(1):229–236

    Article  Google Scholar 

  8. Chia-Chen L, Pei-Feng S (2010) DCT-based reversible data hiding scheme. J Softw 5(2):p214–p224

    Google Scholar 

  9. Conway M (2004) Code wars: steganography, signals, intelligence, and terrorism. Technol Terrorism 16(2):171–191

    Google Scholar 

  10. Dave HP (2012) Steganography technique based on DCT coefficients. Int J Eng Res Appl 2:713–717

    Google Scholar 

  11. Elham Ghasemi JS (2011) High capacity image steganography using wavelet transform and genetic algorithm. Proc Int Multiconf Eng Comput Sci 1:495–498

    Google Scholar 

  12. Jahankhani, H. et all. (2008). Conference proceedings. In: Jahankhani, H. et al. Global E-Security. London: Springer. p23–25.

  13. Jason Hiney TD (2015) Using Facebook for Image Steganography. George Mason University 2

  14. Kaitezenbessier S, Petitcolas F (2016) Information hiding, New York, Artech House, pp p40–p41

  15. Kalaivanan SAA, Ananth V, Manikandan T (2015) A survey on digital image steganography. Int J Emerg Trends Technol Comput Sci 4(1):30–33

  16. Kessler G, Hosmer C (2011) Chapter 2 – An Overview of Steganography. Available: http://www.sciencedirect.com/science/article/pii/B9780123855107000023.

  17. Kim C, Yang CN (2015) Watermark with DSA signature using predictive coding. Multimed Tools Appl 74:5189–5203. https://doi.org/10.1007/s11042-013-1667-6

    Article  Google Scholar 

  18. Korus P, Białas J, Dziech A (2014) A new approach to high-capacity annotation watermarking based on digital fountain codes. Multimed Tools Appl 68:59–77. https://doi.org/10.1007/s11042-011-0986-8

    Article  Google Scholar 

  19. Leiner BM et al. (2017) Brief History of the Internet. Available: http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet.

  20. Ghoshal N, Mandal J (2010) Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT). Proc ICCS 17(24):144

  21. Mao J, Huang Y, Niu X, Xiao G, Zhu L, Sheng W (2016) A method to estimate the steganographic capacity in DCT domain based on MCUU model. Wuhan Univ J Nat Sci 21(4):283–290

    Article  Google Scholar 

  22. Mazurczyk W, Szaga P, Szczypiorski K (2014) Using transcoding for hidden communication in IP telephony. Multimed Tools Appl 70:2139–2165. https://doi.org/10.1007/s11042-012-1224-8

    Article  Google Scholar 

  23. Mazurczyk W, Karaś M, Szczypiorski K, Janicki A (2016) YouSkyde: information hiding for Skype video traffic. Multimed Tools Appl 75:13521–13540

    Article  Google Scholar 

  24. Neeta Nain JS (2012) Steganography using odd-even based embedding and compensation procedure to restore histogram. Proc World Congr Eng Comput Sci 1:24–26

    Google Scholar 

  25. Rabie T, Kamel I (2017) High-capacity Steganographyy: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473–6493

    Article  Google Scholar 

  26. Ramapriya B (2017) An improved approach of text steganography in application with rotational symmetry. Int J Innov Res Comput Commun Eng 5(7):12939–12947

    Google Scholar 

  27. Rana S, Sur A (2018) View invariant DIBR-3D image watermarking using DT-CWT. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-7024-z

  28. Scheiner S (2015) Why is BMP used in steganography? Available: https://www.quora.com/Why-is-bmp-used-in-steganography. Last accessed 12th Jan 2018.

  29. Sharma A, Jain N (2013) Steganography & cryptography for regimented data hiding system: A review. Int J Sci Res 4(4):3119–3124

    Google Scholar 

  30. Super A, All (2005) The rise of steganography. Proc Stud/Fac Res Day 1(1):1

    Google Scholar 

  31. Tataru R et al (2015) Is hidden data safe? Analysis of the Public Crypt & Hide-Steganos Application. Proc Rom Acad 16(1):299–312

    MathSciNet  Google Scholar 

  32. Thampi SM (2007) Information hiding techniques: a tutorial review. Network Security & Cryptography 1(1):1–19

  33. Tsai C-W L-H (2010) A lossless data hiding method by histogram shifting based on an adaptive block division scheme. Department of Computer Science, National Chiao Tung University 1–14

  34. Wayner P (2009) Disappearing Cryptography. Information Hiding and Watermarking, 3rd edn. Elsevier, Burlington, pp 337–353

    Book  Google Scholar 

  35. Westfeld A (2004) F5—A steganographic algorithm. In: Moskowitz I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg

  36. Zhang S, Gao TG, Yang FS (2014) A high capacity reversible data hiding scheme based on multi-level integer DWT and histogram modification. Int J Digit Crime Forensic 6:51–64. https://doi.org/10.1007/s11042-015-2740-0

    Article  Google Scholar 

  37. Zielińska, E. et all. (2015). Development trends in steganography. Inst Telecommun 1 (1), p1–13.

Download references

Acknowledgments

This research is from the Intelligent System Research Centre from London Metropolitan University. The authors would like to thank Dr. Qicheng Yu from the School of Computing and Digital Media from London Metropolitan University (United Kingdom) for helpful comments and observations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Istteffanny Isloure Araujo.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Araujo, I.I., Kazemian, H. Improving Steganographic capacity using distributed steganography over BMP. Multimed Tools Appl 79, 26181–26195 (2020). https://doi.org/10.1007/s11042-020-09298-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09298-3

Keywords

Navigation