Abstract
Our research area tackles the improvement of private data security using our proposed Steganographic method called DSoBMP-I (Distributed Steganography over BMP faze I) to improve the issues of low capacity, high detectability and distortion. The methodology consists of a new distributed steganographic approach to minimise the main weaknesses of today’s methods, including Discrete Cosine Transform, where the capacity, detectability and distortion needs an upgrade to accommodate securer steganography for our data protection. The proposed prototype approach that evolved after a few experiments using our distributed steganographic method, where secrete data is secure into a set of BMP files (as it is proven more reliable), originates from a raw file that is not necessarily a BMP at the start. After applying a layer of encryption for extra security using two different methods such as RC4 & RSA, comparing the two encryption techniques for its agility and extra security to address the issue of low capacity and better security using the DSoBMP-I method, all deriving from the supplied image. The overall achievement was improved capacity that doubles as the set of BMP images increases, less distortion and detectability as secrete data stays among different files.
Similar content being viewed by others
References
Al-Turfi M (2012) Text realisation image steganography. Int J Eng 6(1):1–9
Antony N (2015) Improved capacity college steganography using discrete cosine transformation. Int J Sci Eng Res 6(11):1060–1064
Bisk (2017) The History of Information Security. Available: https://www.villanovau.com/resources/iss/history-of-information-security/#.WPSEv_nyuM9.
Borse D, Patil S (2015) Review on transform domain Steganographic techniques (DCT & DWT). Int J Innov Res Comput Commun Eng 3(12):12466–12473
Britanak V, Yip PC (2006) Discrete cosine and sine transforms general properties, fast algorithms and integer approximations. Elsevier, San Diego
Chandramoulia R, Memon N (2015) Steganography capacity: A Steganalysis perspective. A Department of E.C.E. Stevens Inst Technol 1(1):1–5
Chen J, Chen TS, Hong W, Lin CN, Wu MC, Wu HY (2013) A space increased reversible information hiding technique by reducing redundant recording. Procedia Comput Sci 17(1):229–236
Chia-Chen L, Pei-Feng S (2010) DCT-based reversible data hiding scheme. J Softw 5(2):p214–p224
Conway M (2004) Code wars: steganography, signals, intelligence, and terrorism. Technol Terrorism 16(2):171–191
Dave HP (2012) Steganography technique based on DCT coefficients. Int J Eng Res Appl 2:713–717
Elham Ghasemi JS (2011) High capacity image steganography using wavelet transform and genetic algorithm. Proc Int Multiconf Eng Comput Sci 1:495–498
Jahankhani, H. et all. (2008). Conference proceedings. In: Jahankhani, H. et al. Global E-Security. London: Springer. p23–25.
Jason Hiney TD (2015) Using Facebook for Image Steganography. George Mason University 2
Kaitezenbessier S, Petitcolas F (2016) Information hiding, New York, Artech House, pp p40–p41
Kalaivanan SAA, Ananth V, Manikandan T (2015) A survey on digital image steganography. Int J Emerg Trends Technol Comput Sci 4(1):30–33
Kessler G, Hosmer C (2011) Chapter 2 – An Overview of Steganography. Available: http://www.sciencedirect.com/science/article/pii/B9780123855107000023.
Kim C, Yang CN (2015) Watermark with DSA signature using predictive coding. Multimed Tools Appl 74:5189–5203. https://doi.org/10.1007/s11042-013-1667-6
Korus P, Białas J, Dziech A (2014) A new approach to high-capacity annotation watermarking based on digital fountain codes. Multimed Tools Appl 68:59–77. https://doi.org/10.1007/s11042-011-0986-8
Leiner BM et al. (2017) Brief History of the Internet. Available: http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet.
Ghoshal N, Mandal J (2010) Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT). Proc ICCS 17(24):144
Mao J, Huang Y, Niu X, Xiao G, Zhu L, Sheng W (2016) A method to estimate the steganographic capacity in DCT domain based on MCUU model. Wuhan Univ J Nat Sci 21(4):283–290
Mazurczyk W, Szaga P, Szczypiorski K (2014) Using transcoding for hidden communication in IP telephony. Multimed Tools Appl 70:2139–2165. https://doi.org/10.1007/s11042-012-1224-8
Mazurczyk W, Karaś M, Szczypiorski K, Janicki A (2016) YouSkyde: information hiding for Skype video traffic. Multimed Tools Appl 75:13521–13540
Neeta Nain JS (2012) Steganography using odd-even based embedding and compensation procedure to restore histogram. Proc World Congr Eng Comput Sci 1:24–26
Rabie T, Kamel I (2017) High-capacity Steganographyy: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473–6493
Ramapriya B (2017) An improved approach of text steganography in application with rotational symmetry. Int J Innov Res Comput Commun Eng 5(7):12939–12947
Rana S, Sur A (2018) View invariant DIBR-3D image watermarking using DT-CWT. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-7024-z
Scheiner S (2015) Why is BMP used in steganography? Available: https://www.quora.com/Why-is-bmp-used-in-steganography. Last accessed 12th Jan 2018.
Sharma A, Jain N (2013) Steganography & cryptography for regimented data hiding system: A review. Int J Sci Res 4(4):3119–3124
Super A, All (2005) The rise of steganography. Proc Stud/Fac Res Day 1(1):1
Tataru R et al (2015) Is hidden data safe? Analysis of the Public Crypt & Hide-Steganos Application. Proc Rom Acad 16(1):299–312
Thampi SM (2007) Information hiding techniques: a tutorial review. Network Security & Cryptography 1(1):1–19
Tsai C-W L-H (2010) A lossless data hiding method by histogram shifting based on an adaptive block division scheme. Department of Computer Science, National Chiao Tung University 1–14
Wayner P (2009) Disappearing Cryptography. Information Hiding and Watermarking, 3rd edn. Elsevier, Burlington, pp 337–353
Westfeld A (2004) F5—A steganographic algorithm. In: Moskowitz I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg
Zhang S, Gao TG, Yang FS (2014) A high capacity reversible data hiding scheme based on multi-level integer DWT and histogram modification. Int J Digit Crime Forensic 6:51–64. https://doi.org/10.1007/s11042-015-2740-0
Zielińska, E. et all. (2015). Development trends in steganography. Inst Telecommun 1 (1), p1–13.
Acknowledgments
This research is from the Intelligent System Research Centre from London Metropolitan University. The authors would like to thank Dr. Qicheng Yu from the School of Computing and Digital Media from London Metropolitan University (United Kingdom) for helpful comments and observations.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Araujo, I.I., Kazemian, H. Improving Steganographic capacity using distributed steganography over BMP. Multimed Tools Appl 79, 26181–26195 (2020). https://doi.org/10.1007/s11042-020-09298-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09298-3