Skip to main content
Log in

A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Everyday dealing with enormous amounts of sensitive data requires its protection and communication over the insecure network. The field of ‘Steganography’ always attracted researchers for significant amount of scientific attention to protect and communicate sensitive data. This paper presents a secure steganography scheme for hiding Gray-scale secret image into a Color cover image by replacing cover image bits in frequency domain using modified quantum substitution box (S-Box). The inclusion of modified quantum S-Box for concealing secret bits in randomly selected any of the two channels of cover image ensures enhanced security. In the proposed scheme, we first performed discrete cosine transform (DCT) on the cover image. Then, quantum S-box is applied to locate the position of DCT coefficients where least significant bits are substituted intelligently based on the relative ordering of DCT frequencies. This relative ordering is achieved by traversing DCT coefficients in a zigzag manner where less important pixels have been altered more effectively without any major loss in image quality. The security of proposed method is examined by key space, key sensitivity parameters and robustness analysis. Additionally, the conducted simulation results demonstrate that our proposed steganography scheme has better visual image quality in terms of MSE, PSNR, UQI, SSIM, RMSE parameters as compared to other state-of-the-art works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

It is declare that this paper does not has any associated private datasets. The used Cover and Secret images in this paper are publicly available.

References

  1. Muhammad, K., Ahmad, J., Rehman, N., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools Appl. 76, 03 (2017)

    Article  Google Scholar 

  2. Hassaballah, M., Hameed, M.A., Awad, A.I., Muhammad, K.: A novel image steganography method for industrial internet of things security. IEEE Trans. Ind. Inf. 17(11), 7743–7751 (2021)

    Article  Google Scholar 

  3. Kadhim, I., Premaratne, P., Vial, P., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 11 (2018)

    Google Scholar 

  4. Subramanian, N., Elharrouss, O., Al-ma’adeed, S., Bouridane, A.: Image steganography: a review of the recent advances. IEEE Access PP, 1–1, 01 (2021)

  5. Lingamallu, N.S., Veeramani, V.: Secure and covert communication using steganography by wavelet transform. Optik 242, 167167 (2021)

    Article  ADS  Google Scholar 

  6. Sheidaee, A., Farzinvash, L.: A novel image steganography method based on DCT and ISB. In: 2017 9th International Conference on Information and Knowledge Technology (IKT), pp. 116–123 (2017)

  7. Ngamnij, A., Nguyen, T.D., Somjit, A.: An adaptive multi bit-plane image steganography using block data-hiding. Multimed Tools Appl. 75, 8319–8345 (2016)

    Article  Google Scholar 

  8. Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  ADS  MATH  Google Scholar 

  9. Singh, A., Singh, H.: An improved lsb based image steganography technique for RGB images. In: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–4 (2015)

  10. Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19(4), 593–598 (2017)

    Google Scholar 

  11. Zhang, X., Wang, S.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12, 67–70 (2005)

    Article  ADS  Google Scholar 

  12. Farman, H., Jan, Z., Sajjad, M., Baik, S.W., Muhammad, K., Ahmad, J.: A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet Inf. Syst. 9, 1938–1962 (2015)

    Google Scholar 

  13. Ahmed, A., Ahmed, A.: A secure image steganography using LSB and double XOR operations. Int. J. Comput. Sci. Netw. Secur. 20(5), 139–144 (2020)

    Google Scholar 

  14. Xia, Z., Wang, X., Xingming, S., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75, 11 (2014)

    Google Scholar 

  15. Liao, Q.W.X., Zhang, J.: A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1), 1–8 (2011)

    Article  Google Scholar 

  16. Swain, G.: A steganographic method combining LSB substitution and PVD in a block. 85:39–44 (2016). International Conference on Computational Modelling and Security (CMS 2016)

  17. Swain, G., Sahu, A.K.: An optimal information hiding approach based on pixel value differencing and modulus function. Wirel. Pers. Commun. 108, 159–174 (2019)

    Article  Google Scholar 

  18. Lee, C.-F., Chang, C.-C., Xie, X., Mao, K., Shi, R.-H.: An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53, 30–39 (2018)

    Article  Google Scholar 

  19. Yahi, A., Bekkouche, T., El Hossine, M., Daachi, N.D.: A color image encryption scheme based on 1D cubic map. Optik 249, 168290 (2022)

    Article  ADS  Google Scholar 

  20. Khashandarag, A.S., Navin, A.H., Mirnia, M.K., Mohammadi, H.H.A.: An optimized color image steganography using LFSR and DFT techniques. In: International Conference on Computer Education, Simulation and Modeling, pp. 247–253. Springer (2011)

  21. Sobot, R.: Discrete Fourier transformation. In: Engineering Mathematics by Example, pp. 437–466. Springer, Berlin (2021)

  22. Mandal, J.K.: Discrete Fourier transform-based steganography. In: Reversible Steganography and Authentication via Transform Encoding, pp. 63–98. Springer, Berlin (2020)

  23. Chahar, V., Kumar, D.: A modified dwt-based image steganography technique. Multimedia Tools Appl. 77, 06 (2018)

    Google Scholar 

  24. Gutub, A., Al-Shaarani, F.: Efficient implementation of multi-image secret hiding based on LSB and dwt steganography comparisons. Arab. J. Sci. Eng. 45(4), 2631–2644 (2020)

    Article  Google Scholar 

  25. Sharafi, J., Khedmati, Y., Shabani, M.M.: Image steganography based on a new hybrid chaos map and discrete transforms. Optik 226, 165492 (2021)

    Article  ADS  Google Scholar 

  26. Walia, E., Jain, P., Navdeep: An analysis of LSB & DCT based steganography. Global J. Comput. Sci. Technol. 10 (2010)

  27. Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimedia (2018)

  28. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76(11), 13493–13510 (2017)

    Article  Google Scholar 

  29. Kaur, R., Singh, B.: A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map. Multimedia Tools Appl. 80, 14665–14691 (2021)

    Article  Google Scholar 

  30. Savithri, G, Mane, S., Saira Banu, J., et al.: Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography. In: Proceedings of International Conference on Computer Vision and Image Processing, pp. 593–605. Springer (2017)

  31. Susanto, A., Sari, C.A., Rachmawanto, E.H., et al.: Hybrid method using HWT-DCT for image watermarking. In: 2017 5th International Conference on Cyber and IT Service Management (CITSM), pp. 1–5. IEEE (2017)

  32. Montero, A.S., Lang, J.: Skeleton pruning by contour approximation and the integer medial axis transform. Comput. Graph. 36(5), 477–487 (2012). Shape Modeling International (SMI) Conference (2012)

  33. Subhedar, M.S., Mankar, V.H.: Image steganography using contourlet transform and matrix decomposition techniques. Multimedia Tools Appl. 78, 22155–22181 (2019)

    Article  Google Scholar 

  34. Vinod Kumar, R.S., Shahi, D., Reshma, V.K.: Optimized support vector neural network and contourlet transform for image steganography. Evol. Intel. 15, 1295–1311 (2022)

    Article  Google Scholar 

  35. Furht, B.: Discrete Cosine Transform (DCT), pp. 203–205. Springer US, Boston (2006)

  36. Siddeq, M.M., Rodrigues, M.A.: DCT and DST based image compression for 3D reconstruction. 3D Res. 8 (2017)

  37. Abd El-Latif, A., Abd-El-Atty, B., Venegas-Andraca, S.: A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92–102 (2019)

    Article  ADS  MATH  Google Scholar 

  38. Nashat, D., Mamdouh, L.: An efficient steganographic technique for hiding data. J. Egypt. Math. Soc. 27, 12 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  39. Wen-Long, X., Chang, C.-C., Chen, T.-S., Wang, L.-M.: An improved least-significant-bit substitution method using the modulo three strategy. Displays 42, 36–42 (2016)

    Article  Google Scholar 

  40. Wang, Y., Tang, M., Wang, Z.: High-capacity adaptive steganography based on LSB and hamming code. Optik 213, 164685 (2020)

    Article  ADS  Google Scholar 

  41. Abd-El-Atty, B.: A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput. Appl. (2022)

  42. Patel, P., Patel, Y.: Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption. In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 736–739. IEEE (2015)

  43. Fateh, M., Rezvani, M., Irani, Y.: A new method of coding for steganography based on LSB matching revisited. Secur. Commun. Netw. (2021)

  44. Ajith, V., Kanagaraj, S., Malathi, P.: Image steganography based on LSB matching revisitedusing secret sharing application. Int. J. Appl. Eng. Res. 10, 2931–2938 (2015)

    Google Scholar 

  45. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)

    Article  Google Scholar 

  46. Chakraborty, S., Jalal, A.S., Bhatnagar, C.: LSB based non blind predictive edge adaptive image steganography. Multimedia Tools Appl. 76(6), 7973–7987 (2017)

    Article  Google Scholar 

  47. Bhatt, S., Ray, A., Ghosh, A., Ray, A.: Image steganography and visible watermarking using LSB extraction technique. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2015)

  48. Dadgostar, H., Afsari, F.: Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J. Inf. Secur. Appl. 30, 94–104 (2016)

    Google Scholar 

  49. Rao, K.R., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press Professional Inc, New York (1990)

    Book  MATH  Google Scholar 

  50. Zhu, D., Tong, X., Zhang, M., Wang, Z.: A new s-box generation method and advanced design based on combined chaotic system. Symmetry 12(12), 2087 (2020)

    Article  ADS  Google Scholar 

  51. Farwa, S., Muhammad, N., Khan, S.: A novel image encryption based on algebraic s-box and Arnold transform. 3D Res. 8, 09 (2017)

  52. Shahzad, I., Mushtaq, Q., Razaq, A.: Construction of new s-box using action of quotient of the modular group for multimedia security. Secur. Commun. Netw. 11 (2019)

  53. Sourkhani, I.G., Hematpour, N., Sodeif, A., Sani, R.H.: A new steganographic algorithm based on coupled chaotic maps and a new chaotic s-box. Multimedia Tools Appl. 81, 39753–39784 (2022)

    Article  Google Scholar 

  54. Naik, R.B., Singh, U.: A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann. Data Sci. 1–26 (2022)

  55. Chen, X., Qian, S., Yu, F., Zhang, Z., Shen, H., Huang, Y., Cai, S., Deng, Z., Li, Y., Du, S.: Pseudorandom number generator based on three kinds of four-wing memristive hyperchaotic system and its application in image encryption. Complexity 2020 (2020)

  56. Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A 547, 123869 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  57. Lawgali, A., Bouridane, Angelova, M.: Handwritten Arabic character recognition: Which feature extraction method. Int. J. Adv. Sci. Technol. 34, 1–8 (2011)

    Google Scholar 

  58. USC-SIPI Image Database. https://sipi.usc.edu/database. Accessed on 23rd December 2023

  59. University of Waterloo Database. https://links.uwaterloo.ca/Repository.html. Accessed on 23rd December 2023

  60. Jiang, N., Zhao, N., Wang, L.: LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 55(1), 107–123 (2016)

    Article  MATH  Google Scholar 

  61. Oszust, M.: Full-reference image quality assessment with linear combination of genetically selected quality measures. PLoS ONE 11(6), e0158333 (2016)

    Article  Google Scholar 

  62. Yang, R., Zhou, Y.-H., Yang, Y.-G., Xu, P., Shi, W.-M.: Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6 (2016)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonam Maurya.

Ethics declarations

Conflict of interest

The authors declare that there is no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maurya, S., Nandu, N., Patel, T. et al. A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box. Quantum Inf Process 22, 206 (2023). https://doi.org/10.1007/s11128-023-03914-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-023-03914-5

Keywords

Navigation