Abstract
Everyday dealing with enormous amounts of sensitive data requires its protection and communication over the insecure network. The field of ‘Steganography’ always attracted researchers for significant amount of scientific attention to protect and communicate sensitive data. This paper presents a secure steganography scheme for hiding Gray-scale secret image into a Color cover image by replacing cover image bits in frequency domain using modified quantum substitution box (S-Box). The inclusion of modified quantum S-Box for concealing secret bits in randomly selected any of the two channels of cover image ensures enhanced security. In the proposed scheme, we first performed discrete cosine transform (DCT) on the cover image. Then, quantum S-box is applied to locate the position of DCT coefficients where least significant bits are substituted intelligently based on the relative ordering of DCT frequencies. This relative ordering is achieved by traversing DCT coefficients in a zigzag manner where less important pixels have been altered more effectively without any major loss in image quality. The security of proposed method is examined by key space, key sensitivity parameters and robustness analysis. Additionally, the conducted simulation results demonstrate that our proposed steganography scheme has better visual image quality in terms of MSE, PSNR, UQI, SSIM, RMSE parameters as compared to other state-of-the-art works.
Similar content being viewed by others
Data availability
It is declare that this paper does not has any associated private datasets. The used Cover and Secret images in this paper are publicly available.
References
Muhammad, K., Ahmad, J., Rehman, N., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools Appl. 76, 03 (2017)
Hassaballah, M., Hameed, M.A., Awad, A.I., Muhammad, K.: A novel image steganography method for industrial internet of things security. IEEE Trans. Ind. Inf. 17(11), 7743–7751 (2021)
Kadhim, I., Premaratne, P., Vial, P., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 11 (2018)
Subramanian, N., Elharrouss, O., Al-ma’adeed, S., Bouridane, A.: Image steganography: a review of the recent advances. IEEE Access PP, 1–1, 01 (2021)
Lingamallu, N.S., Veeramani, V.: Secure and covert communication using steganography by wavelet transform. Optik 242, 167167 (2021)
Sheidaee, A., Farzinvash, L.: A novel image steganography method based on DCT and ISB. In: 2017 9th International Conference on Information and Knowledge Technology (IKT), pp. 116–123 (2017)
Ngamnij, A., Nguyen, T.D., Somjit, A.: An adaptive multi bit-plane image steganography using block data-hiding. Multimed Tools Appl. 75, 8319–8345 (2016)
Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)
Singh, A., Singh, H.: An improved lsb based image steganography technique for RGB images. In: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–4 (2015)
Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19(4), 593–598 (2017)
Zhang, X., Wang, S.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12, 67–70 (2005)
Farman, H., Jan, Z., Sajjad, M., Baik, S.W., Muhammad, K., Ahmad, J.: A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet Inf. Syst. 9, 1938–1962 (2015)
Ahmed, A., Ahmed, A.: A secure image steganography using LSB and double XOR operations. Int. J. Comput. Sci. Netw. Secur. 20(5), 139–144 (2020)
Xia, Z., Wang, X., Xingming, S., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75, 11 (2014)
Liao, Q.W.X., Zhang, J.: A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1), 1–8 (2011)
Swain, G.: A steganographic method combining LSB substitution and PVD in a block. 85:39–44 (2016). International Conference on Computational Modelling and Security (CMS 2016)
Swain, G., Sahu, A.K.: An optimal information hiding approach based on pixel value differencing and modulus function. Wirel. Pers. Commun. 108, 159–174 (2019)
Lee, C.-F., Chang, C.-C., Xie, X., Mao, K., Shi, R.-H.: An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53, 30–39 (2018)
Yahi, A., Bekkouche, T., El Hossine, M., Daachi, N.D.: A color image encryption scheme based on 1D cubic map. Optik 249, 168290 (2022)
Khashandarag, A.S., Navin, A.H., Mirnia, M.K., Mohammadi, H.H.A.: An optimized color image steganography using LFSR and DFT techniques. In: International Conference on Computer Education, Simulation and Modeling, pp. 247–253. Springer (2011)
Sobot, R.: Discrete Fourier transformation. In: Engineering Mathematics by Example, pp. 437–466. Springer, Berlin (2021)
Mandal, J.K.: Discrete Fourier transform-based steganography. In: Reversible Steganography and Authentication via Transform Encoding, pp. 63–98. Springer, Berlin (2020)
Chahar, V., Kumar, D.: A modified dwt-based image steganography technique. Multimedia Tools Appl. 77, 06 (2018)
Gutub, A., Al-Shaarani, F.: Efficient implementation of multi-image secret hiding based on LSB and dwt steganography comparisons. Arab. J. Sci. Eng. 45(4), 2631–2644 (2020)
Sharafi, J., Khedmati, Y., Shabani, M.M.: Image steganography based on a new hybrid chaos map and discrete transforms. Optik 226, 165492 (2021)
Walia, E., Jain, P., Navdeep: An analysis of LSB & DCT based steganography. Global J. Comput. Sci. Technol. 10 (2010)
Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimedia (2018)
Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76(11), 13493–13510 (2017)
Kaur, R., Singh, B.: A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map. Multimedia Tools Appl. 80, 14665–14691 (2021)
Savithri, G, Mane, S., Saira Banu, J., et al.: Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography. In: Proceedings of International Conference on Computer Vision and Image Processing, pp. 593–605. Springer (2017)
Susanto, A., Sari, C.A., Rachmawanto, E.H., et al.: Hybrid method using HWT-DCT for image watermarking. In: 2017 5th International Conference on Cyber and IT Service Management (CITSM), pp. 1–5. IEEE (2017)
Montero, A.S., Lang, J.: Skeleton pruning by contour approximation and the integer medial axis transform. Comput. Graph. 36(5), 477–487 (2012). Shape Modeling International (SMI) Conference (2012)
Subhedar, M.S., Mankar, V.H.: Image steganography using contourlet transform and matrix decomposition techniques. Multimedia Tools Appl. 78, 22155–22181 (2019)
Vinod Kumar, R.S., Shahi, D., Reshma, V.K.: Optimized support vector neural network and contourlet transform for image steganography. Evol. Intel. 15, 1295–1311 (2022)
Furht, B.: Discrete Cosine Transform (DCT), pp. 203–205. Springer US, Boston (2006)
Siddeq, M.M., Rodrigues, M.A.: DCT and DST based image compression for 3D reconstruction. 3D Res. 8 (2017)
Abd El-Latif, A., Abd-El-Atty, B., Venegas-Andraca, S.: A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92–102 (2019)
Nashat, D., Mamdouh, L.: An efficient steganographic technique for hiding data. J. Egypt. Math. Soc. 27, 12 (2019)
Wen-Long, X., Chang, C.-C., Chen, T.-S., Wang, L.-M.: An improved least-significant-bit substitution method using the modulo three strategy. Displays 42, 36–42 (2016)
Wang, Y., Tang, M., Wang, Z.: High-capacity adaptive steganography based on LSB and hamming code. Optik 213, 164685 (2020)
Abd-El-Atty, B.: A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput. Appl. (2022)
Patel, P., Patel, Y.: Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption. In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 736–739. IEEE (2015)
Fateh, M., Rezvani, M., Irani, Y.: A new method of coding for steganography based on LSB matching revisited. Secur. Commun. Netw. (2021)
Ajith, V., Kanagaraj, S., Malathi, P.: Image steganography based on LSB matching revisitedusing secret sharing application. Int. J. Appl. Eng. Res. 10, 2931–2938 (2015)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Chakraborty, S., Jalal, A.S., Bhatnagar, C.: LSB based non blind predictive edge adaptive image steganography. Multimedia Tools Appl. 76(6), 7973–7987 (2017)
Bhatt, S., Ray, A., Ghosh, A., Ray, A.: Image steganography and visible watermarking using LSB extraction technique. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2015)
Dadgostar, H., Afsari, F.: Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J. Inf. Secur. Appl. 30, 94–104 (2016)
Rao, K.R., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press Professional Inc, New York (1990)
Zhu, D., Tong, X., Zhang, M., Wang, Z.: A new s-box generation method and advanced design based on combined chaotic system. Symmetry 12(12), 2087 (2020)
Farwa, S., Muhammad, N., Khan, S.: A novel image encryption based on algebraic s-box and Arnold transform. 3D Res. 8, 09 (2017)
Shahzad, I., Mushtaq, Q., Razaq, A.: Construction of new s-box using action of quotient of the modular group for multimedia security. Secur. Commun. Netw. 11 (2019)
Sourkhani, I.G., Hematpour, N., Sodeif, A., Sani, R.H.: A new steganographic algorithm based on coupled chaotic maps and a new chaotic s-box. Multimedia Tools Appl. 81, 39753–39784 (2022)
Naik, R.B., Singh, U.: A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann. Data Sci. 1–26 (2022)
Chen, X., Qian, S., Yu, F., Zhang, Z., Shen, H., Huang, Y., Cai, S., Deng, Z., Li, Y., Du, S.: Pseudorandom number generator based on three kinds of four-wing memristive hyperchaotic system and its application in image encryption. Complexity 2020 (2020)
Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A 547, 123869 (2020)
Lawgali, A., Bouridane, Angelova, M.: Handwritten Arabic character recognition: Which feature extraction method. Int. J. Adv. Sci. Technol. 34, 1–8 (2011)
USC-SIPI Image Database. https://sipi.usc.edu/database. Accessed on 23rd December 2023
University of Waterloo Database. https://links.uwaterloo.ca/Repository.html. Accessed on 23rd December 2023
Jiang, N., Zhao, N., Wang, L.: LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 55(1), 107–123 (2016)
Oszust, M.: Full-reference image quality assessment with linear combination of genetically selected quality measures. PLoS ONE 11(6), e0158333 (2016)
Yang, R., Zhou, Y.-H., Yang, Y.-G., Xu, P., Shi, W.-M.: Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6 (2016)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Maurya, S., Nandu, N., Patel, T. et al. A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box. Quantum Inf Process 22, 206 (2023). https://doi.org/10.1007/s11128-023-03914-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-023-03914-5