Skip to main content
Log in

Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Steganography is one of the leading strategy that is employed to hide restricted content into a cover media so that the person unaware of the fact can’t predict that the cover media can acquire some secret information. The effectiveness of any steganographic approach is appraised on imperceptibility of the stego-media, payload of the cover media, integrity of the secret information, security, and computational complexity. The work presented in this paper focuses on these important concerns of secured data transmission. The proposed steganographic approach uses multimedia files including animated image sequences as cover media for concealing secret messages. The entire secret information to be embedded is converted to a code using Secure Hash Algorithm-1 (SHA-1) (National Institute of Standards, and Technology (US). Technology Administration. Secure hash standard, 1993) and shared with the secret message to validate the authenticity of the transmitted secret information. The whole secret message is converted to its ASCII to embed them by replacing the least significant digit (LSD) (Liu et al. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), IEEE, 2012). The receiver validates the transmitted information with SHA-1 again generating a code, which validates with the existing code sent over from the transmitting end. The proposed algorithm is worked upon a variety of text messages with a large set of color animated image sequences as cover media and also has been tested carefully by different parametric measures. This algorithm gives robust outputs in terms of visual imperceptibility, safety, and embedding capability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5.
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Availability of Data and Material

All the input animated sequences are available at Standard Animated GIF Dataset. https://giphy.com/

Code Availability

All the codes were developed and implemented by the authors of this manuscript. This code is not available anywhere and we do not want to upload this code before the publication of this paper. But if the code is required for review purposes it can be made available exclusively for that purpose.

References

  1. National Institute of Standards, and Technology (US). (1993). Technology administration. Secure hash standard vol 180(1). US Department of Commerce, Technology Administration, National Institute of Standards and Technology

  2. Liu, J., Zhou, K., & Tian, H. (2012). Least-significant-digit steganography in low bit rate speech. In Proceedings of the 2012 IEEE international conference on communications (ICC) (pp. 1133–1137). IEEE.

  3. Basak, R. K., Dasgupta, K., & Dutta, P. (2018). Steganography in grey scale animated GIF using hash based pixel value differencing. In Proceedings of the 2018 fourth international conference on research in computational intelligence and communication networks (ICRCICN) (pp. 248–252). IEEE.

  4. Pal, D., & Ghoshal, N. (2018). Secured and imperceptible data transmission through digital audio signal with reduced internal noise. Wireless Personal Communications, 100(2), 505–518.

    Article  Google Scholar 

  5. Zhou, R. G., & Luo, J. (2019). A novel quantum steganography scheme based on ASCII. In Advances in Quantum Communication and Information. IntechOpen.

  6. Delp, E., & Mitchell, O. (1979). Image compression using block truncation coding. IEEE Transactions on Communications, 27(9), 1335–2134.

    Article  Google Scholar 

  7. Li, L., He, M., Zhang, S., Luo, T., & Chang, C. C. (2019). AMBTC based high payload data hiding with modulo-2 operation and Hamming code. Mathematical Biosciences and Engineering, 16(6), 7934–7949.

    Article  Google Scholar 

  8. Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., & Ahmad, B. (2018). Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero

  9. Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444–1450.

    Article  Google Scholar 

  10. Horng, J. H., Chang, C. C., & Li, G. L. (2020). Steganography using quotient value differencing and LSB substitution for AMBTC compressed images. IEEE Access, 8, 129347–129358.

    Article  Google Scholar 

  11. Mukherjee, N., Paul, G., Saha, S. K., & Burman, D. (2020). A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimedia Tools and Applications, 79(19), 13449–13479.

    Google Scholar 

  12. Lin, J., Qian, Z., Wang, Z., Zhang, X., & Feng, G. (2020). A new steganography method for dynamic GIF images based on palette sort. Wireless Communications and Mobile Computing, 2020.

  13. Eastlake, D., & Jones, P. (2001). US secure hash algorithm 1 (SHA-1).

  14. Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Information Technology and Control, 46(1), 16–36.

    Article  Google Scholar 

  15. Amirulhaqi, A., Purboyo, T. W., & Nugrahaeni, R. A. (2017). Security on GIF images using steganography with LSB method, spread spectrum and the vigenere cipher. International Journal of Applied Engineering Research, 12(23), 13604–13609.

    Google Scholar 

  16. Hore, A., & Ziou, D. (2010). Image quality metrics: PSNR vs. SSIM. In: Proceedings of the 2010 20th international conference on pattern recognition. IEEE

  17. Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image processing, 6(6), 677–686.

    Article  Google Scholar 

  18. Eyssa, A. A., Abdelsamie, F. E., & Abdelnaiem, A. E. (2020). An efficient image steganography approach over wireless communication system. Wireless Personal Communications, 110(1), 321–337.

    Article  Google Scholar 

  19. Sahu, A. K., & Swain, G. (2019). An optimal information hiding approach based on pixel value differencing and modulus function. Wireless Personal Communications, 108(1), 159–174.

    Article  Google Scholar 

  20. Johnvictor, A. C., Rangaswamy, R., Chidambaram, G., & Durgamahanthi, V. (2018). Unsupervised optimization for universal spatial image steganalysis. Wireless Personal Communications, 102(1), 1–18.

    Article  Google Scholar 

  21. Yesilyurt, M., & Yalman, Y. (2016). New approach for ensuring cloud computing security: Using data hiding methods. Sādhanā, 41(11), 1289–1298.

    Article  Google Scholar 

  22. Xiang, T., Hu, J., & Sun, J. (2015). Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing, 43, 28–37.

    Article  Google Scholar 

  23. Wu, C. C., Kao, S. J., & Hwang, M. S. (2011). A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and Software, 84(12), 2196–2207.

    Article  Google Scholar 

  24. Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107–123.

    Article  Google Scholar 

  25. Swain, G. (2019). Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arabian Journal for Science and Engineering, 44(4), 2995–3004.

    Article  Google Scholar 

  26. Mielikainen, J. (2006). LSB matching revisited. IEEE Signal Processing Letters, 13(5), 285–287.

    Article  Google Scholar 

  27. Turner, L. F. (2019). Digital data security system.

  28. Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14(2), 253–266.

    Article  Google Scholar 

  29. Fridrich, J., & Goljan, M. (2002, April). Practical steganalysis of digital images: state of the art. In Security and Watermarking of Multimedia Contents IV (Vol. 4675, pp. 1–13). International Society for Optics and Photonics.

  30. Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.

    Article  Google Scholar 

  31. Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high quality steganographic method with pixelvalue differencing and modulus function. Journal of Systems and Software, 81(1), 150–158.

    Article  Google Scholar 

  32. Luo, W., Huang, F., & Huang, J. (2011). A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications, 52(2–3), 407–430.

    Article  Google Scholar 

  33. Chang, C. C., Chou, Y. C., & Kieu, T. D. (2008). An information hiding scheme using Sudoku. In Proceedings of the 2008 3rd international conference on innovative computing information and control (pp. 17–17). IEEE.

  34. Chang, C. C., Liu, Y., & Nguyen, T. S. (2014). A novel turtle shell based scheme for data hiding. In Proceedings of the 2014 tenth international conference on intelligent information hiding and multimedia signal processing (pp. 89–93). IEEE.

  35. Standard Animated GIF Dataset. https://giphy.com/

Download references

Funding

The authors proclaim that they have not gained any funding from any institute.

Author information

Authors and Affiliations

Authors

Contributions

All the authors of this manuscript contributed in this paper to design the algorithm, to experiment the use of the algorithm in a large scale of animated image sequences and to prepare the manuscript.

Corresponding author

Correspondence to Ratan Kumar Basak.

Ethics declarations

Conflict of interest

The author declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Basak, R.K., Chatterjee, R., Dutta, P. et al. Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm. Wireless Pers Commun 122, 1891–1920 (2022). https://doi.org/10.1007/s11277-021-08973-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08973-4

Keywords

Navigation