1 Introduction

The idea of image steganography is hiding image in another cover image. The objective of any image steganography scheme is to secure some secret images from intruders. Both secret images and the cover image need to be saved from deteriorations. The cover image quality and hidden image secrecy are main targets [1].

Although last image steganography approaches are widely used for securing secret data, they have problems such as capacity or the quality of steganography image or security or noise. Different approaches have been presented for image steganography based on spatial and transformed domains such as Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) [2]. Hussain et al. presented a survey on spatial domain techniques implementing Least Significant Bit (LSB) approaches [3]. Sandoval et al. presented a spatial domain image steganography method by embedding data in pixel values directly [4]. This method is subjected to removal of the secret image through simple manipulations such as filters. Sheidaee et al. presented DCT steganography approach, whose basic idea is to embed data in DCT lowest and medium coefficients [5]. Kim et al. performed image steganography based on block matching in DWT [6]. Steganography approaches have been studied in the literature without consideration of the wireless communication segment. With the modern advances in communication systems and the bad need to secure images through the communication process, there is a necessity to investigate the robustness of the steganography process in the presence of communication channel degradations. OFDM is the most widely used wireless communication technology. OFDM doesn’t need complex equalization filters. It uses many slowly modulated narrowband signals rather than the rapidly modulated wideband signal. Therefore, the channel equalization is simplified so that they are considered as the advantages of OFDM. OFDM presents low symbol rate, which makes a guard interval between symbols, and also it has the capability to eliminate Inter-Symbol Interference (ISI), echoes, and time-spreading [7,8,9]. This work is divided into two parts, The objective of the first part is performing steganography approach, which achieves high security and high capacity with keeping the quality of steganography image. The objective of the second part is studying the effect of channels through OFDM on this proposed approach.

2 Related Work

Most of the researches carried out in the area of image steganography depend on DCT, DWT, and the LSB. This part offers the latest methods for hiding data in a cover image. In [10], the researchers used Advanced Encryption Standard (AES) encryption algorithm on a secret image in order to increase safety. In order to embed secret image, IWT, and LSB are used after dividing the host image into blocks. Due to using blocks, there is a little distortion in the steganography image. If there is an increase in the size of the data, the distortion will be clear in the steganography image. In [11], the proposed method depends on DCT. At the first,the authors used filter to determine the position of the edges of color image, so they used limited size of data. After that performing DCT on (Red, Green, Blue) channels of the image. The half difference of coefficients of (Red, Blue) represents 0 and a half average of coefficients of (Red, Blue) represents 1 from embedded data. After that, they put them in an equal position of green coefficients. If there is noise, the positions of edges will be changed and the extracted data will be deformed.

In [12], the authors used an image scrambling in order to preserve the privacy of image contents, after that it’s converted to an un correlated color space HSV. On the other hand, an Iterative Magic Matrix Encryption Algorithm (IMMEA) encrypts the secret data. In order to embed data into V plane of HSV color model, LSB method is used. This way gives high quality for steganography images with low capacity because it used one plane of HSV color model. In [13], the researchers implemented image steganography by embedding message to LSB of quantized DCT coefficients which is performed on YCbCr components of cover image. In [14], the authors used fuzzy edge detection in order to detect the edges of image for embedding secret data in it by LSB method. this method gives high quality. The idea of the technique in [15] is embedding encrypted secret text into 2D Haar Discrete Wavelet Transform coefficients of YCbCr model channels. Despite getting high PSNR, the size of secret data is small. The method in [16] allows embedding of three secret images in the RGB color coordinate system using DWT. Secret images and cover image are divided into four bands by DWT and embeds LL bands of color plans of secret images into three color plans of cover image.

The previously mentioned approaches and some others used spatial domain and frequency domain with properties of the cover image. The enhancement of data security maintains the quality of the steganography and secret images. In this study, image steganography used an uncorrelated color space, DWT, DCT, and chaotic Baker map encryption are adopted to achieve security. The second part of this paper presents transmitting steganography image through OFDM over wireless channels and study their effects on the reconstructed images.

3 The Proposed Algorithm of Image Steganography

The first part of this research proposes a new technique. The proposed technique is divided into two algorithms (Embedding and Extracting). We have used encryption, DCT and DWT inorder to make it more secure.

3.1 Embedding of Secret Images

It illustrates how to hide three secret images in the cover image as shown in Fig. 1. The cover image size is chosen to be (512 × 512). The payload images have equal size (256 × 256) because the size of each band from DWT on the cover image is (256 × 256), It is necessary to perform encryption to increase security. This proposed algorithm used high frequency bands (LH, HL, HH),so we can embed three secret images with size (256 × 256) in these bands.

Fig. 1
figure 1

Embedding model

  • Step 1 Chaotic Backer map encryption is used for changing the order of pixels of secret images with a key. It’s used with DCT to prevent any attacker from knowing secret data.

  • Step 2 The red, blue, and green components of both the cover and encrypted secret images are separated.

  • Step 3 The red, blue and green components are normalized to a maximum of 1.

  • Step 4 Normalized components (Rn,Gn,Bn) are converted to Y,Db,Dr components in order to increase the security.

  • Step 5 DWT is performed on each of the normalized components of the cover image and DCT performed on each of the RGB normalized component of the secret images.

  • Step 6 Gain coefficient (α1) is multiplied by DCT coefficients of each normalized channel of RGB model for each secret image. DWT coefficients in (LH,HL,HH) bands for each channel of YDbDr color model of the cover image are combined with DCT coefficients of the normalized channels of RGB model of each secret image. \(M(x,y) = C(x,y) + \alpha_{1} P(x,y)\),where M is considered to be DWT coefficients of each component of YDbDr color model of modified cover image, C is DWT coefficients of (LH “Vertical details”, HL” horizontal details “,HH “diagonal details”) bands for every channel YDbDr of original cover image, P is DCT of normalized channels of RGB model for each payload image, α1 is chosen in such a way that the payload images are not visible in the steganography image.

  • Step 7 Inverse DWT is performed on each channel resulting from the combination.

  • Step 8 “YDbDr” is converted to RGB on results from step 7 to get a steganography image.

3.2 Extracting of Secret Images

The extracting algorithm explains how to extract three secret images from steganography image by knowing the cover image at the receiver as shown in Fig. 2.

Fig. 2
figure 2

Extracting model

  • Step 1 Red, Blue and Green components of both the steganography and cover images are separated.

  • Step 2 All the three components in both cases are normalized.

  • Step 3 The normalized channels are converted to “YDbDr” channels.

  • Step 4 2-D DWT is performed on components resulting from step 3 on cover and steganography images using DWT.

  • Step 5 The difference between high coefficients bands of DWT(LH “Vertical details”, HL” horizontal details “,HH “diagonal details”) for each channel of steganography and cover images is performed. Inverse DCT is computed for difference components for each channel coefficients.

  • Step 6 RGB components resulting from step 5 are combined inorder to get the extracted encrypted secret images.

  • Step 7 The chaotic Backer map decryption with the key is performed to get the extracted images.

3.3 Analysis to Get Values of α 1

By obtaining the relation between α1 and PSNR for all reconstructed images as shown in the curve found in Fig. 3. The Peak Signal to Noise Ratio (PSNR (dB)) is one of the public matrices for evaluating the quality of images. It’s clear from the curve, 0.08 is the best value of α1 inorder to get the best PSNR for all reconstructed image.

Fig. 3
figure 3

The effect of changing gain factor on steganography images

3.4 Stego Image with an Additive White Gaussian Noise

If we add white Gaussian noise to the stego image, where the range of SNR from (1 to 100). It’s observed that the curve in Fig. 4 has a good PSNR at α1 = 0.08 for all reconstructed image. Stego image has a good quality at noise as shown in Fig. 5. Figure 6 shows the reconstructed images at SNR = 30 dB.

Fig. 4
figure 4

Reconstructed images with AWGN

Fig. 5
figure 5

a, b, c Histogram for red, green and blue channel for noisy stego image at SNR = 30 dB compared to the cover image. (Color figure online)

Fig. 6
figure 6

Reconstructed images at α1 = 0.08 with noise at SNR = 30 dB

4 Transmitting Steganography Image in OFDM with Gaussian and Rayleigh Fading Channels

4.1 Transmitting Steganography Image Through OFDM

  • Figure 7 illustrates OFDM system where the input is steganography image obtained from the embedding algorithm.

    Fig. 7
    figure 7

    OFDM transmit model for steganography image

  • In OFDM modulation block, we used Quadrature Amplitude Modulation QAM with order 2. High efficiency is resulted from utilizing QAM obtained by setting a suitable constellation size in order to match the noise level of the communications channel.

  • The pilot symbol is transmitted with the received signal to detect the OFDM symbol start. It can also be used for channel estimation. Sam in [17] used pilot symbols for analysing and implementation of channel estimation in OFDM system, where the pilot symbol has a special symmetry so that the pilot symbol doesn’t need to be known at the receiver.

  • The IFFT block computes Inverse Fast Fourier Transform for high-efficiency signal processing.

  • One of the solutions to overcome the Rayleigh channel effect is using OFDM with a Guard Interval (GI) [18], because it resists propagation delays, and reduces interference to the next user.

4.2 Transmitting Steganography Image in OFDM with Modification

Figure 8 illustrates the modified OFDM system, it utilizes Least Square estimation channel (LSE). These fading profiles introduce inter-symbol interference, it must be compensated by using channel estimation to enhance the quality of steganography image. After that, guided image filter has been used. The content of a guidance image is utilized by the guided filter to make filtering on a specific image, which can be the input image itself or another different image. The guided filter is based on an edge preserving smoothing operator. The guided filter is widely performed in a great variety of computer vision and computer graphics applications because of its noise reduction, detail smoothing/enhancement [19]. The modification in the receiving side of OFDM has been introduced in order to enhance the performance of OFDM system on transmitted image over wireless channels.

Fig. 8
figure 8

OFDM transmitting model with modification for stego image

5 Results and Discussion

Table 1 shows results at Rayleigh fading and AWGN channels at delays = [0,1e09], Gain = [0,0], SNR = 30 dB, and size of steganography _color image is 512 × 512. It’s clear that the AWGN and Multipath Fading channels have a very bad effect on transmitting steganography image through OFDM system. Due to these channels, the steganography image will have noise and the value of pixels will be changed, then the steganography and the secret image will be destroied. The correlation coefficient represents the performance of steganography image through OFDM, where a higher correlation coefficient means that the reconstructed images have a high quality. As a result of bad outputs, the OFDM system must be modified to get better results and enhances the quality of reconstructed images. So, channel estimation and filter are used to compensate the errors resulting from wireless channels. Correlation coefficients for reconstructed images obtained from the modified OFDM are listed in Table 2. The correlation coefficient equals 1 when there is no change in the image. From Fig. 9, it is clear that using LS channel estimation gives a good quality for reconstructed images. And also Table 3 shows the Doppler Effect on reconstructed images through OFDM with modification. Despite the noise generated by AWGN and Rayleigh channels, the quality of reconstructed images is good at different Doppler shift values at SNR = 30 dB. The algorithm that’s found in [10] embeds data in LSB of high coefficients of IWT of the blocked cover image, The quality deteriorates if the size of the secret image further increases, The algorithm in [12],when the percentage of secret data becomes 72,74% the PSNR of stego image will be 21.96. The idea of this algorithm is embedding data in LSB of V plane of HSV conversion of an encrypted cover image. Despite the highest PSNR, the capacity of secret data is low. The algorithm found in [13] depends on the properties of cover image YCbCr, the embedding process based on LSB technique with DCT transform. The capacity is low with small PSNR.In this proposed approach the capacity percentage of secret data is 75% compared with the latest algorithms found in Table 4. The proposed approach of steganography enables us to embed the highest capacity of secret data, where the capacity is the number of bits that can be embedded in cover media. Additionally using color space YDbDr gives high quality and high security compared to others color spaces models as shown in Table 5. From Fig. 10,it’s clear that BER gotten from OFDM system modification is satisfied compared with transmitting the image over AWGN channel in methods [10]. As shown in Fig. 11, it’s clear that OFDM with modification gives the lowest BER compared with OFDM without modification over AWGN and Rayleigh channels.

Table 1 Correlation coefficients for reconstructed images in OFDM
Table 2 Correlation coefficients for reconstructed images in modified OFDM
Fig. 9
figure 9

Reconstructed images at SNR = 30 dB and Rayleigh channel

Table 3 Reconstructed images at different Doppler shift over A WGN and Rayleigh channels
Table 4 Comparison between capacity of last methods and the proposed approach
Table 5 Effect of uncorrelated color spaces on reconstructed images
Fig. 10
figure 10

BER of steganography image over AWGN channel

Fig. 11
figure 11

Comparison between BER of transmitting steganography images through OFDM and OFDM with modification over AWGN and Rayleigh channels

6 Conclusion

This paper has introduced an efficient approach for embedding and extracting steganography data, and also the proposed approach enables us to hide three images in one cover image. It also achieves more security because of using a gain coefficient (α1), merging two different types of image transforms and encryption. In this paper, the effect of AWGN and multipath fading channels on the steganography image and the extracted data through OFDM system has been studied. In order to reduce the distortion resulted from wireless channels, the modification on OFDM system has been performed. Simulation results are promising towards a more efficient colour steganography scheme.