Skip to main content
Log in

Cartesian coordinated adaptive hiding for payload peaking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Transferring multimedia content without detection has gained traction over time. Employing steganography for hiding secret data, viz. passwords, medical information, and private messages, has become the norm. This work involves hiding confidential information in the images. It aims to increase the payload capacity by adaptively choosing the embedding pixel location, using hamming distance, and increasing the number of bits embedded per pixel using threshold while retaining the image quality. The secret PHI information was embedded into the medical cover image by choosing the pixels, such that the embedding order was random. The randomness in the embedding order was achieved by generating a random sequence using a Combined Logistical Tent map. (CLT map). The random sequence was used as the key to choose all the pixels, but in a random order for embedding. Two different ways can generate the CLT map. One is by generating the Logistical map sequence and Tent map sequence and performing the XOR operation of both sequences. The other way is to generate the CLT map sequence through governing equations. The algorithm is designed to perform embedding for images of various modalities, viz. effectively., Grayscale, RGB and DICOM. The algorithm was tested for over 100 images across databases. The test results were satisfactory. The resultant stego image has an acceptable range of Peak Signal to Noise Ratio (PSNR) values above 40 dB and Structural Similarity Index (SSIM) values above 0.9. The stego images with visually imperceptible secret information are good quality and could effectively mitigate steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Algorithm 1:
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Ahmad MA, Elloumi M, Samak AH, Al-Sharafi AM, Alqazzaz A, Kaid MA, Iliopoulos C (2022) Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in DICOM images. Alex Eng J 61(12):10577–10592. https://doi.org/10.1016/j.aej.2022.03.056

    Article  Google Scholar 

  2. Ansari AS, Mohammadi MS, Parvez MT (2020) A multiple-format steganography algorithm for color images. IEEE Access 8:83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130

    Article  Google Scholar 

  3. Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) Hamming code. Springerplus 5(1):1–13. https://doi.org/10.1186/s40064-016-1818-0

    Article  Google Scholar 

  4. Chatterjee A, Ghosal SK, Sarkar R (2020) LSB based steganography with OCR: an intelligent amalgamation. Multimed Tools Appl 79(17–18):11747–11765. https://doi.org/10.1007/s11042-019-08472-6

    Article  Google Scholar 

  5. Cheng J, Chen Z, Yang R (2018) An efficient histogram-preserving steganography based on block. Eurasip J Image Video Process 2018(1):1–13. https://doi.org/10.1186/s13640-018-0306-6

    Article  Google Scholar 

  6. Chervyakov N, Lyakhov P, Nagornov N (2020) Analysis of the quantization noise in discrete wavelet transform filters for 3D medical imaging. Appl Sci 10(4):1223. https://doi.org/10.3390/app10041223

    Article  Google Scholar 

  7. “DICOM Library - Anonymize, Share, View DICOM files ONLINE.” (n.d.) https://www.dicomlibrary.com/?manage=02ef8f31ea86a45cfce6eb297c274598. Accessed 16 Apr. 2021

  8. “Downloads available.” (n.d.) http://www.pcir.org/researchers/downloads_available.html. Accessed 16 Apr. 2021

  9. Duan X, Guo D, Liu N, Li B, Gou M, Qin C (2020) A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network. IEEE Access 8:25777–25788. https://doi.org/10.1109/ACCESS.2020.2971528

    Article  Google Scholar 

  10. Duan X, Wang W, Liu N, Yue D, Xie Z, Qin C (2020) StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module. IEEE Access 8:195253–195262. https://doi.org/10.1109/access.2020.3033895

    Article  Google Scholar 

  11. Elhadad A, Ghareeb A, Abbas S (2021) A blind and high-capacity data hiding of DICOM medical images based on fuzzification concepts. Alexandria Eng J 60(2):2471–2482. https://doi.org/10.1016/j.aej.2020.12.050

    Article  Google Scholar 

  12. El-Khamy SE, Korany NO, Mohamed AG (2020) A New Fuzzy-DNA Image Encryption and Steganography Technique. IEEE Access 8:148935–148951. https://doi.org/10.1109/ACCESS.2020.3015687

    Article  Google Scholar 

  13. Faragallah OS, El-Hoseny H, El-Shafai W, Abd El-Rahman W, El-Sayed HS, El-Rabaie ESM, Abd El-Samie FE, Geweid GG (2020) A comprehensive survey analysis for present solutions of medical image fusion and future directions. IEEE Access 9:11358–11371. https://doi.org/10.1109/ACCESS.2020.3048315

    Article  Google Scholar 

  14. Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7:185189–185204. https://doi.org/10.1109/ACCESS.2019.2960254

    Article  Google Scholar 

  15. Hamzaoui R, Saupe D (2006) In: Barni M (ed) Fractal Image Compression. Document and Image Compression, vol 968. CRC Press, pp 168–169 ISBN 9780849335563. Retrieved 5 April 2011

    Google Scholar 

  16. Huang L-C, Chiou S-F, Hwang M-S (2021) A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images. Informatica 32(1):69–84. https://doi.org/10.15388/20-infor422

    Article  MathSciNet  Google Scholar 

  17. “Image Databases.” (n.d.) http://www.imageprocessingplace.com/root_files_V3/image_databases.htm. Accessed 16 Apr. 2021

  18. Jayapandiyan JR, Kavitha C, Sakthivel K (2020) Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization. IEEE Access 8:136537–136545. https://doi.org/10.1109/ACCESS.2020.3009234

    Article  Google Scholar 

  19. Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139:109691. https://doi.org/10.1016/j.mehy.2020.109691

    Article  Google Scholar 

  20. Kasapbasi MC (2019) A New Chaotic Image Steganography Technique Based on Huffman Compression of Turkish Texts and Fractal Encryption with Post-Quantum Security. IEEE Access 7:148495–148510. https://doi.org/10.1109/ACCESS.2019.2946807

    Article  Google Scholar 

  21. Kim P-H, Ryu K-W, Jung K-H (2020) Reversible data hiding scheme based on pixel-value differencing in dual images. Int J Distrib Sens Networks 16(7):155014772091100. https://doi.org/10.1177/1550147720911006

    Article  Google Scholar 

  22. Lawnik M (2018) Combined logistic and tent map. J Phys Conf Ser 1141(1):12132. https://doi.org/10.1088/1742-6596/1141/1/012132

    Article  MathSciNet  Google Scholar 

  23. Lin C-C, Lin J, Chang C-C (2021) Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding. Electronics 10(3):281. https://doi.org/10.3390/electronics10030281

    Article  Google Scholar 

  24. Nashat D, Mamdouh L (2019) An efficient steganographic technique for hiding data. J Egypt Math Soc 27(1):57. https://doi.org/10.1186/s42787-019-0061-6

    Article  MathSciNet  Google Scholar 

  25. Phadikar A, Jana P, Mandal H (2019) Reversible Data Hiding for DICOM Image Using Lifting and Companding. Cryptography 3:21. https://doi.org/10.3390/cryptography3030021

    Article  Google Scholar 

  26. Rustad S, Setiadi DRIM, Syukur A, Andono PN (2021) Inverted LSB image steganography using adaptive pattern to improve imperceptibility. J King Saud Univ - Comput Inf Sci 34:3559–3568. https://doi.org/10.1016/j.jksuci.2020.12.017

    Article  Google Scholar 

  27. “Sample DICOM files.” (n.d.) https://www.rubomedical.com/dicom_files/index.html. Accessed 20 Jul 2023

  28. Su A, Ma S, Zhao X (2020) Fast and Secure Steganography Based on J-UNIWARD. IEEE Signal Process Lett 27:221–225. https://doi.org/10.1109/LSP.2020.2964485

    Article  Google Scholar 

  29. Su GD, Lin CC, Chang CC (2021) Privacy-Preserving Reversible Data Hiding for Medical Images Employing Local Rotation. J Healthc Eng 2021:5709513. https://doi.org/10.1155/2021/5709513

    Article  Google Scholar 

  30. Verma V, Muttoo SK, Singh VB (2020) Enhanced payload and trade-off for image steganography via a novel pixel digits alteration. Multimed Tools Appl 79(11–12):7471–7490. https://doi.org/10.1007/s11042-019-08283-9

    Article  Google Scholar 

  31. Wazirali R, Alasmary W, Mahmoud MMEA, Alhindi A (2019) An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms. IEEE Access 7:133496–133508. https://doi.org/10.1109/ACCESS.2019.2941440

    Article  Google Scholar 

  32. Welstead ST (1999) Fractal and wavelet image compression techniques. SPIE Publication, https://spie.org/Publications/Book/353798

    Book  Google Scholar 

  33. Zhang W, Li S (2008) A coding problem in steganography. Des Codes Crypt 46(1):67–81. https://doi.org/10.1007/s10623-007-9135-9

    Article  MathSciNet  Google Scholar 

  34. Zhang Y, Luo X, Guo Y, Qin C, Liu F (2019) Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection. IEEE Access 7:24282–24289. https://doi.org/10.1109/ACCESS.2019.2900286

    Article  Google Scholar 

Download references

Acknowledgments

Authors thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ET-I/2018/221(C)). The authors thank Intrusion LAB at School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.

Funding

DST FIST funding (SR/FST/ET-I/2018/221(C)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Ethics declarations

Ethics approval

This article contains no studies with human participants performed by authors.

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manikandan, V., Amirtharajan, R. Cartesian coordinated adaptive hiding for payload peaking. Multimed Tools Appl 83, 17135–17162 (2024). https://doi.org/10.1007/s11042-023-16208-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16208-w

Keywords

Navigation