Skip to main content
Log in

A novel combination of information confidentiality and data hiding mechanism

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the widespread accessibility of the Internet, communicating and sharing multimedia content between people is extremely easy today. At the same time, however, a critical issue is the secure transfer of personal and protected material. In this article, we have proposed a new information security mechanism. The proposed system comprises two phases. In the first phase, the digital data is encrypted and in the second phase, the encrypted data is embedded into the cover data. The encryption scheme consists of both diffusion and confusion. For diffusion, we have utilized a logistic chaotic map-based novel diffusion. For confusion pre-defined highly nonlinear S-boxes are used. This mechanism provides dual layers of security to the confidential information, which makes it difficult for the intruder to extract the confidential information. The security analysis of the encryption and data hiding schemes are carried out and tabulated. For implementation on hardware the time analysis is carried out, and the time for encryption and data hiding comes out to be 1.662 seconds, which is reasonable for real-time implementation. The security analysis of encryption and data hiding shows the immunity of the proposed system to withstand different attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The authors declare that data supporting the findings of this study are available within the article.

References

  1. Abd El-Latif AA, Abd-El-Atty B, Elseuofi S, Khalifa HS, Alghamdi AS, Polat K, Amin M (2020) Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys A Stat Mech Appl 541:123687

  2. Alanazi N, Khan E, Gutub A (2021) Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimed Tools Appl 80(1):1403–1431

  3. Alghafis A, Waseem HM, Khan M, Jama SS (2020) A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states. Phys A Stat Mech Appl, Elsevier, vol 554

  4. Alghafis A, Munir N, Khan M, Hussain I (2020) An encryption scheme based on discrete quantum map and continuous chaotic systeman encryption scheme based on discrete quantum map and continuous chaotic system. Int J Theor Phys 59:1227–1240

    Article  MATH  Google Scholar 

  5. Alghafis A, Waseem HM, Khan M, Jamal SS, Amin M, Batool SI (2020) A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox. Wirel Netw 90

  6. Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul (MATCOM) 177:441–466

    Article  MATH  Google Scholar 

  7. Alghafis A, Waseem HM, Khan M, Jamal SS (2020) A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox. Wirel Netw

  8. Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604

    Article  Google Scholar 

  9. Arshad U, Khan M, Shaukat S, Amin M, Shah T (2020) An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Phys A Stat Mech Appl 546

  10. Batool SI, Shah T, KhanM (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25(7):2037–2045

  11. Gu Z, Li H, Khan S, Deng L, Du X, Guizani M, Tian Z (2021) IEPSBP: a cost-efficient image encryption algorithm based on parallel chaotic system for green IoT. IEEE Trans Green Commun Netw 6(1):89–106

  12. He Y, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Applic 32:247–260

    Article  Google Scholar 

  13. Hussain I, Gondal MA (2014) Stego optical encryption based on chaotic Baker's map transformation. Zeitschrift für Naturforschung A 69(a):249–253

    Article  Google Scholar 

  14. Jamal SS, Shah T, Hussain I (2013) An efficient scheme for digital watermarking using chaotic map. Nonlinear Dyn 3:73–1474

    Google Scholar 

  15. Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-box transformation. Wirel Pers Commun Int J 90(4):2033–2049

  16. Jamal SS, Farwa S, Alkhaldi A i H, Aslam M, Gondal MAG (2019) A robust steganographic technique based on improved chaotic-range systems. Chin J Phys 61:301–309

    Article  Google Scholar 

  17. Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wirel Netw 25(4):1491–1503

  18. Khan LS, Khurshid K, Aman A (2018) Using co-occurrence and granulometry features for content based image retrieval. EAI Endorsed Trans. Scalable Inf Syst 5(16):e13

  19. Khan M, Masood F, Alghafis A, Amin M, Naqvi SIB (2019 A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS One 14(12):e0225031

  20. Khan M, Masood F, Alghafis A (2020) Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Multimed Tools Appl 32:11837–11857

    Google Scholar 

  21. Khan M, Jamal SS, Waqas UA (2020) A novel combination of information hiding and confidentiality scheme. Multimed Tools Appl 79:30983–31005

    Article  Google Scholar 

  22. Khan M, Alanazi AS, Said L, Hussain I (2021) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst

  23. Li Q, Wang X, Wang X, Ma B, Wang C, Xian Y, Shi Y (2020) A novel grayscale image steganography scheme based on chaos encryption and generative adversarial networks. IEEE Access 8:168166–168176

    Article  Google Scholar 

  24. Liao X, Yin J, ChenM, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing

  25. Marvel L, Boncelet C, Retter CT (2020) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Article  Google Scholar 

  26. May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261:459–467

    Article  MATH  Google Scholar 

  27. Mukherjee R, Roy S, Sanyal G (2018) Image steganography using mid position value technique. Proc Comput Sci 132:461–468

    Article  Google Scholar 

  28. Munir N, Khan M, Wei Z, Akgul A, Amin M, Hussain I (2020) Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. Wirel Netw:1–18

  29. Nestor T, Jacques K, Abd-El-Atty B, Iliyasu AM, Hirota K, El-Latif AA (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515(12)

  30. Norouzi B, Mirzakuchaki S (2017) An image encryption algorithem based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681–13701

    Article  Google Scholar 

  31. Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558–574

  32. Shah T, Jamal SS (2020) An improved chaotic cryptosystem for image encryption and digital watermarking. Wirel Pers Commun 110(3):1429–1442

  33. Sheela S, Sathyanarayana SV (2016) Application of chaos theory in data security-a survey. ACCENTS Trans Inform Secur 2(5):1–15

    Article  Google Scholar 

  34. Song W, Hou J j, Li Z h, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent South Univ Technol 18:116–124

    Article  Google Scholar 

  35. Taburet T, Patrick B, Sawaya W, Fridrich J (2020) Natural steganography in JPEG domain with a linear development pipeline. IEEE Trans Inf Forensics Secur 16:173–184

    Article  Google Scholar 

  36. Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl 79:23507–23529

    Article  Google Scholar 

  37. Tsafack N, Sankar S, Abd-El-Atty B, Kengne J, Jithin KC, Belazi A, Mehmood I, Bashir AK, Song O-Y, Abd El-Latif AA (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731–137744

  38. Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl:6891–6914

  39. Waseem HM, KhanM (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125(2):1–14

Download references

Acknowledgments

Dr. Sajjad Shaukat Jamal extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research groups program under grant number R. G. P. 2/109/43.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lal Said Khan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, L.S., Khan, M., Hazzazi, M.M. et al. A novel combination of information confidentiality and data hiding mechanism. Multimed Tools Appl 82, 6917–6941 (2023). https://doi.org/10.1007/s11042-022-13623-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13623-3

Keywords

Navigation