Skip to main content
Log in

Cover independent image steganography in spatial domain using higher order pixel bits

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In spatial domain image steganography, Least Significant Bits (LSB) of cover image pixels are used to embed a secret message due to minimal distortion and higher payload capacity. In this paper, we have introduced an exclusive-OR (XOR) based encoding of encrypted secret message bits using varying higher-order pixel intensity bits. Encoding and LSB embedding is done block-wise by dividing the cover image into a number of blocks. The secret message is first encrypted using symmetric key cryptography and then encoded those encrypted bits by XORing them with randomly selected higher-order pixel bis of the cover image to obscure the secret bits further. Next, an inversion technique is applied to the encoded bits block-wise to keep the LSB bit changes to a minimum. The stego-key consists of the symmetric encryption key and the encode-key containing parameter settings such as the number_of_blocks, starting_block, start_pixel_offset, block_selection_rule, etc. This stego-key is shared prior to the actual communication using public-key cryptography to ensure the key’s authenticity and integrity. The extraction process does not require the cover image; the stego-image and the stego-key are sufficient. Experimental results show the visual imperceptibility along with improved image quality metrics such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Normalized Cross-Correlation (NCC), and Structural Similarity (SSIM) index in comparison to other well-known techniques. The average PSNR value remains above 51dB, even with 90% of the capacity utilized. The proposed scheme successfully eludes many standard steganalysis attacks such as histogram-based analysis (PDH), chi-square based embed probability test, Regular and Singular groups (RS) analysis, sample pair test, etc. on the tested stego-images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799–17823

    Article  Google Scholar 

  2. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and xor coding. Expert Syst Appl 46:293–306

    Article  Google Scholar 

  3. Al-Nofaie SMA, Gutub AAA (2020) Utilizing pseudo-spaces to improve arabic text steganography for multimedia data communications. Multimed Tools Appl 79(1–2):19–67. https://doi.org/10.1007/s11042-019-08025-x

    Article  Google Scholar 

  4. Bharti SS, Gupta M, Agarwal S (2019) A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multimed Tools Appl 78(16):23179–23201

    Article  Google Scholar 

  5. Bhuiyan T, Sarower AH, Karim MR, Hassan MM (2019) An image steganography algorithm using lsb replacement through xor substitution. In: 2019 International conference on information and communications technology (ICOIACT). IEEE, pp 44–49

  6. Biswas R, Bandyapadhay SK (2020) Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79:7101–7120. https://doi.org/10.1007/s11042-019-08497-x

    Article  Google Scholar 

  7. Boehm B (2014) Stegexpose-a tool for detecting lsb steganography. arXiv:1409.1556

  8. Chan CK, Cheng LM (2004) Hiding data in images by simple lsb substitution. Pattern Recognit 37(3):469–474

    Article  Google Scholar 

  9. Chang CC, Tseng HW (2009) Data hiding in images by hybrid lsb substitution. In: Third international conference on multimedia and ubiquitous engineering (MUE’09). IEEE, pp 360–363

  10. Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for sd and hd videos. Multimed Tools Appl 78(5):5769–5789. https://doi.org/10.1007/s11042-018-6093-3

    Article  Google Scholar 

  11. Datta B, Mukherjee U, Bandyopadhyay SK (2016) Lsb layer independent robust steganography using binary addition. Procedia Comput Sci 85:425–432

    Article  Google Scholar 

  12. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings. International conference on image processing, vol 3. IEEE, pp 641–644

  13. Dumitrescu S, Wu X, Wang Z (2002) Detection of lsb steganography via sample pair analysis. In: International workshop on information hiding. Springer, pp 355–372

  14. Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimed Tools Appl 79:28225–28238. https://doi.org/10.1007/s11042-020-09324-4

    Article  Google Scholar 

  15. Fridrich J, Goljan M, Du R (2001) Detecting lsb steganography in color, and gray-scale images. IEEE Multimed 8(4):22–28

    Article  Google Scholar 

  16. Ganguly NM, Paul G, Saha SK, Burman D (2020) A pvd based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl 79:13449–13479. https://doi.org/10.1007/s11042-019-08178-9

    Article  Google Scholar 

  17. Kahn D (1996) The history of steganography. In: International workshop on information hiding. Springer, pp 1–5

  18. Kang S, Park H, Park JI (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimed Tools Appl 79:21155–21175. https://doi.org/10.1007/s11042-020-08925-3

    Article  Google Scholar 

  19. Kharrazi M, Sencar HT, Memon N (2006) Improving steganalysis by fusion techniques: a case study with image steganography. In: Transactions on data hiding and multimedia security I. Springer, pp 123–137

  20. Kuznetsov A, Smirnov O, Onikiychuk A, Makushenko T, Anisimova O, Arischenko A (2020) Adaptive pseudo-random sequence generation for spread spectrum image steganography. In: 2020 IEEE 11th international conference on dependable systems, services and technologies (DESSERT). IEEE, pp 161–165

  21. Laishram D, Tuithung T (2021) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity. Multimed Tools Appl 80:831–854. https://doi.org/10.1007/s11042-020-09519-9

    Article  Google Scholar 

  22. Mahato S, Yadav DK, Khan DA (2017) Personal characters to bits mapping using Dot Pattern Character Encoding Scheme (DPCES). J King Saud Univ-Comput Inf Sci 32(2):197–207. https://doi.org/10.1016/j.jksuci.2017.08.003. http://www.sciencedirect.com/science/article/pii/S1319157817301568

    Google Scholar 

  23. Maji G, Mandal S (2019) Secure and robust image steganography using a reference image as key. Int J Innov Technol Explor Eng (IJITEE) 8(7):2828–2839

    Google Scholar 

  24. Maji G, Mandal S (2020) A forward email based high capacity text steganography technique using a randomized and indexed word dictionary. Multimed Tools Appl 1–21. https://doi.org/10.1007/s11042-020-09329-z

  25. Maji G, Mandal S, Sen S, Debnath NC (2018) Dual image based lsb steganography. In: 2nd International conference on recent advances in signal processing, telecommunications & computing (SigTelCom). IEEE, pp 61–66

  26. Maji G, Mandal S, Debnath NC, Sen S (2019) Pixel value difference based image steganography with one time pad encryption. In: 2019 IEEE 17th international conference on industrial informatics (INDIN), vol 1. IEEE, pp 1358–1363

  27. Maji G, Mandal S, Sen S (2020) Dual image-based dictionary encoded data hiding in spatial domain. Int J Inf Secur Privacy (IJISP) 14(2):83–101

    Article  Google Scholar 

  28. Mandal PC, Mukherjee I, Chatterji BN (2021) High capacity reversible and secured data hiding in images using interpolation and difference expansion technique. Multimed Tools Appl 80:3623–3644. https://doi.org/10.1007/s11042-020-09341-3

    Article  Google Scholar 

  29. Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ-Comput Inf Sci 31(3):335–347

    Google Scholar 

  30. Muhammad N, Bibi N, Mahmood Z, Akram T, Naqvi SR (2017) Reversible integer wavelet transform for blind image hiding method. PloS One 12(5):e0176979

    Article  Google Scholar 

  31. Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z (2018) Digital watermarking using hall property image decomposition method. Pattern Anal Appl 21(4):997–1012

    Article  MathSciNet  Google Scholar 

  32. Mukherjee S, Sanyal G (2020) Image steganography with N-puzzle encryption. Multimed Tools Appl 79:29951–29975. https://doi.org/10.1007/s11042-020-09522-0

    Article  Google Scholar 

  33. Sahu AK, Swain G (2019) High fidelity based reversible data hiding using modified lsb matching and pixel difference. J King Saud Univ-Comput Inf Sci

  34. Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Int J Electron Telecommun 65 (2):287–292

    Google Scholar 

  35. Setyono A et al (2019) Securing and hiding secret message in image using xor transposition encryption and lsb method. IOP Publishing, vol 1196, p 012039

  36. Sy Shen, Huang L h, Ss Y u (2018) A novel adaptive data hiding based on improved emd and interpolation. Multimed Tools Appl 77(10):12563–12579

    Article  Google Scholar 

  37. Singh S (2020) Adaptive PVD and LSB based high capacity data hiding scheme. Multimed Tools Appl 79:18815–18837. https://doi.org/10.1007/s11042-020-08745-5

    Article  Google Scholar 

  38. Singh S, Siddiqui TJ (2018) Transform domain techniques for image steganography. In: Computer vision: concepts, methodologies, tools, and applications. IGI Global, pp 170–186

  39. Singh L, Singh A, Singh P (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79(23):15901–15921

    Article  Google Scholar 

  40. Stanley CA (2005) Pairs of values and the chi-squared attack. Department of Mathematics, Iowa State University

  41. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470

    Article  Google Scholar 

  42. Trithemius J, McLean A (1982) The steganographia of Johannes Trithemius. Magnum Opus Hermetic Sourceworks

  43. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  44. Wang J, Cheng M, Wu P, Chen B (2019) A survey on digital image steganography. J Inf Hiding Privacy Protect 1(2):87–93. https://doi.org/10.32604/jihpp.2019.07189

    Article  Google Scholar 

  45. Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding. Springer, pp 61–76

  46. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recognit Lett 24(9-10):1613–1626

    Article  Google Scholar 

  47. Younus ZS, Hussain MK (2019) Image steganography using exploiting modification direction for compressed encrypted data. J King Saud Univ-Comput Inf Sci

  48. Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit Lett 25(3):331–339

    Article  Google Scholar 

  49. Zhang X, Long J, Wang Z, Cheng H (2015) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans Circuits Syst Video Technol 26(9):1622–1631

    Article  Google Scholar 

Download references

Acknowledgments

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giridhar Maji.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maji, G., Mandal, S. & Sen, S. Cover independent image steganography in spatial domain using higher order pixel bits. Multimed Tools Appl 80, 15977–16006 (2021). https://doi.org/10.1007/s11042-020-10298-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10298-6

Keywords

Navigation