Skip to main content

Advertisement

Log in

A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the recent years chaotic map and Discrete Cosine transform (DCT) have surfaced to become an important field in data hiding methods. In this proposed work, a randomly high embedding chaotic value differencing method (RCVD) based on combined application of DCT and Chaotic map is proposed. DCT has energy compaction property which removes the rounding error problems in the embedding and extraction process. Whereas, chaotic maps have significant properties of sensitivity to initial and control parameters, which help to provide security to the proposed algorithm. The embedding of secret data is done by hybrid method namely randomly chaotic value differencing (RCVD). RCVD maintains the human vision system (HVS) by embedding more data in smooth area than in edge area. The experimental results are calculated in terms of Peak Signal to Noise Ratio (PSNR) and embedding capacity. The security of the proposed method is examined by the key space, key sensitivity parameter and histogram analysis. Additionally universal image quality index (Q) and entropy are also calculated for the proposed method. The evaluated results show that the proposed method outperforms the existing steganography techniques in terms of embedding capacity and PSNR.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ali M, Ahn C, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik - Int J Light Electron Opt 125(1):428–434

    Article  Google Scholar 

  2. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336

    Article  Google Scholar 

  3. Bhowal K, Bhattacharyya D, Pal AJ, Kim TH (2013) A GA based audio steganography with enhanced security. Telecommun Syst 52(4):2197–220

    Article  Google Scholar 

  4. Chan C, Cheng L (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  Google Scholar 

  5. Chauhan DS, Singh AK, Kumar B, Saini JP (2019) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 78(4):3911–3923

    Article  Google Scholar 

  6. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Sig Process 90 (3):727–752

    Article  Google Scholar 

  7. Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun 29(3):375–384

    Article  Google Scholar 

  8. Chen CM, Wang KH, Wu TY, Wang EK (2017) On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci Pattern Recog 1(2):1–10

    Google Scholar 

  9. Divya Z, Bharathi M, Dhikhi T (2016) A survey on image steganography techniques. Int J Pharm Technol 8(4):19368–19377

    Google Scholar 

  10. Evsutin O, Melman A, Meshcheryakov R (2020) Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions. Sig Process 179:107811

    Article  Google Scholar 

  11. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907

    Article  Google Scholar 

  12. Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inform Sci 339:234–253

    Article  Google Scholar 

  13. Hussain M, Wahab AWA, Idris YIB, Javed N, Salleh R High capacity data embedding method with LSB and PVD shift. Proceedings of International Cryptology and Information Security Conference, Malaysiapp. pp 139–149

  14. Hussain M, Abdul Wahab AW, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57

    Article  Google Scholar 

  15. Jung K, Yoo K (2015) High-capacity index based data hiding method. Multimed Tools Appl 74(6):2179–2193

    Article  Google Scholar 

  16. Kang S, Park H, Park J (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimed Tools Appl 79(29-30):21155–21175

    Article  Google Scholar 

  17. Kansoa A, Own S (2012) H: steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302

    Article  MathSciNet  Google Scholar 

  18. Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Futur Gener Comput Syst 107:333–350

    Article  Google Scholar 

  19. Khan A, Sarfaraz A (2019) Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method. Soft Comput 23(17):8045–8056

    Article  Google Scholar 

  20. Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114

    Article  Google Scholar 

  21. Kim C, Shin D, Yang CN, Leng L (2020) Hybrid data hiding based on AMBTC using enhanced Hamming code. Appl Sci 10(15):5336

    Article  Google Scholar 

  22. Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644

    Article  Google Scholar 

  23. Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inf Secur Appl 47:94–103

    Google Scholar 

  24. Leng L, Li M, Kim C, Bi X (2016) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354

    Article  Google Scholar 

  25. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  26. Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Comput Stand Interfaces 36(5):855–862

    Article  Google Scholar 

  27. Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim Syst Sign Process 29(4):1801–1818

    Article  Google Scholar 

  28. Maurer UM (1992) A universal statistical test for random bit generators. J Cryptol 5(2):89–105

    Article  MathSciNet  Google Scholar 

  29. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J (2010) NIST Special Publication 800-22 rev1a, A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, US Department of Commerce, USA

  30. Nazari M, Ahmadi ID (2020) A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl, 79 pp 1–32

  31. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Sig Process 138:129–137

    Article  Google Scholar 

  32. Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510

    Article  Google Scholar 

  33. Saxena A, Fernandes F (2013) DCT/DST-based transform coding for intra prediction in image/video coding. IEEE Trans Image Process 22 (10):3974–398

    Article  MathSciNet  Google Scholar 

  34. Sharma VK, Mathur P, Srivastava DK (2019) Highly secure DWT steganography scheme for encrypted data hiding. In: Information and Communication Technology for Intelligent Systems, pp 665–673

  35. Shen S, Huang L (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131–141

    Article  Google Scholar 

  36. Smart N (2012) ECRYPT II yearly report on algorithms and Keysizes (2011–2012), Technical report, european network of excellence in cryptology II

  37. Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93–99

    Article  Google Scholar 

  38. Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7 (2):297–306

    Article  Google Scholar 

  39. Tseng HW, Leng HS (2013) A steganographic method based on pixel-value differencing and the perfect square number. J Appl Math Volume 2013, pp. 1–8

  40. Turner LF (1989) Digital data security system, Patent IPN, WO, 89(08915) p.21

  41. Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl, 78(8), pp. 9971–9989

  42. Wang BA (2002) A universal image quality index. IEEE Sig Process Lett 9(3):81–84

    Article  Google Scholar 

  43. Wang Z, Dong J, Zhen J, Zhu F (2019) Template protection based on chaotic map and DNA encoding for multimodal biometrics at feature level fusion. J Inf Hiding Multimed Sig Process, vol 10 (1) pp. 1–10.

  44. Wu HC, Chao RM, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. Eurasip J Inf Secur, 1 pp 1–9

  45. Wu D, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recoginition Lett 24(9-10):1613–1626

    Article  Google Scholar 

  46. Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74 (24):11163–11186

    Article  Google Scholar 

  47. Zhang J, Lu W, Yin X, Liu W, Yeung Y (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600–605

    Article  Google Scholar 

  48. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajwinder Kaur.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, R., Singh, B. A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map. Multimed Tools Appl 80, 14665–14691 (2021). https://doi.org/10.1007/s11042-021-10528-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10528-5

Keywords

Navigation