Skip to main content
Log in

Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The establishment of secure data transmission among two communicating parties has become challenging. It is due to unexpected attacks during communication over an unsecured transmission channel. The security of secret data is secured by cryptography and steganography. Hence, this work introduces a secure data transmission model by improving the strength of hybrid cryptography and steganography approaches. It is based on an optimized substitution box (S-box) and a texture-based distortion function. The secret data is initially encrypted using a substitution-permutation network-based chaotic system in this approach. This cryptographic algorithm contains two stages: confusion and diffusion stages. The substitution box attains confusion, and the permutation box attains diffusion. However, the security of this cryptosystem strongly depends on the quality of the S-boxes. Hence, a new arithmetic optimization algorithm (AOA) is proposed to create a robust S-box with a high non-linearity score. After encrypting the secret data, the cover elements have been extracted from the embedded domain created using the sign of DCT (Discrete cosine transform) coefficients. Here, the cover elements selection is optimized by re-compressing the cover JPEG image to exclude the zero-valued DCT coefficients. Then, the embedding cost is calculated by developing a new texture-based distortion function to embed more secret data into the texture portion because the visual quality of the texture portions is not affected due to the embedding process. Finally, the encrypted data has been embedded into cover elements using Syndrome-Trellis Coding (STC) to obtain the stego elements. The overall implementation is carried out in the MATLAB platform. The developed model is evaluated based on imperceptibility and undetectability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

Data sharing is not applicable to this article.

References

  1. Sulaiman, M. A. (2020). Evaluating data mining classification methods performance in internet of things applications. Journal of Soft Computing and Data Mining, 1(2), 11–25.

    Google Scholar 

  2. Halunen, K., & Latvala, O. M. (2021). Review of the use of human senses and capabilities in cryptography. Computer Science Review, 39, 100340.

    Article  MathSciNet  Google Scholar 

  3. Dhawan, S., & Gupta, R. (2021). Analysis of various data security techniques of steganography: A survey. Information Security Journal: A Global Perspective, 30(2), 63–87.

    Google Scholar 

  4. Marqas, R. B., Almufti, S. M., & Ihsan, R. R. (2020). Comparing symmetric and asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms. Xi’an Jianzhu Keji Daxue Xuebao/Journal of Xi’an University of Architecture & Technology, 12, 3110–3116.

    Google Scholar 

  5. Rehman, M. U., Shafique, A., Khalid, S., & Hussain, I. (2021). Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps. IEEE Access, 9, 52277–52291.

    Article  Google Scholar 

  6. Beg, S., Ahmad, N., Anjum, A., Ahmad, M., Khan, A., Baig, F., & Khan, A. (2020). S-box design based on optimize LFT parameter selection: A practical approach in recommendation system domain. Multimedia Tools and Applications, 79(17), 11667–11684.

    Article  Google Scholar 

  7. Alzaidi, A. A., Ahmad, M., Doja, M. N., Al Solami, E., & Beg, M. S. (2018). A new 1D chaotic map and $\beta $-hill climbing for generating substitution-boxes. IEEE Access, 6, 55405–55418.

    Article  Google Scholar 

  8. Alrikabi, H. T., & Hazim, H. T. (2021). Enhanced data security of communication system using combined encryption and steganography. International Journal of Interactive Mobile Technologies, 15(16), 145.

    Google Scholar 

  9. Dalal, M., & Juneja, M. (2021). Steganography and steganalysis (in digital forensics): A cybersecurity guide. Multimedia Tools and Applications, 80(4), 5723–5771.

    Article  Google Scholar 

  10. Tehranipoor, M., Pundir, N., Vashistha, N., & Farahmandi, F. (2023). Embedded Watermarks. Hardware Security Primitives (pp. 185–211). Springer.

    Chapter  Google Scholar 

  11. Saravanan, M., & Priya, A. (2019). An algorithm for security enhancement in image transmission using steganography. Journal of the Institute of Electronics and Computer, 1(1), 1–8.

    Article  Google Scholar 

  12. Wazirali, R., Alasmary, W., Mahmoud, M. M., & Alhindi, A. (2019). An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access, 7, 133496–133508.

    Article  Google Scholar 

  13. Wang, M.-X., Yang, H.-M., Jiang, D.-H., Yan, B., Pan, J.-S., & Liu, T. (2022). A novel quantum color image steganography algorithm based on turtle shell and LSB. Quantum Information Processing, 21(4), 1–32.

    Article  MathSciNet  MATH  Google Scholar 

  14. Khudher, I. M. (2021). LSB steganography strengthen footprint biometric template. Bocтoчнo-Eвpoпeйcкий жypнaл пepeдoвыx тexнoлoгий, 1(9–109), 58–65.

    Google Scholar 

  15. Hameed, M. A., Hassaballah, M., Aly, S., & Awad, A. I. (2019). An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access, 7, 185189–185204.

    Article  Google Scholar 

  16. Patani, K., & Rathod, D. (2021). Advanced 3-Bit LSB based on data hiding using steganography. In Data Science and Intelligent Applications, Springer, Singapore 383–390.

  17. Wang, J., Zhang, L. Y., Chen, J., Hua, G., Zhang, Y., & Xiang, Y. (2019). Compressed sensing based selective encryption with data hiding capability. IEEE Transactions on Industrial Informatics, 15(12), 6560–6571.

    Article  Google Scholar 

  18. Zhang, H., & Hu, L. (2019). A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Processing: Image Communication, 78, 331–344.

    Google Scholar 

  19. Kadhim, I. J., Premaratne, P., & Vial, P. J. (2020). Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Processing, 171, 107481.

    Article  Google Scholar 

  20. Zhang, Y., Luo, X., Guo, Y., Qin, C., & Liu, F. (2019). Zernike moment-based spatial image steganography resisting scaling attack and statistic detection. IEEE Access, 7, 24282–24289.

    Article  Google Scholar 

  21. Yeung, Y., Lu, W., Xue, Y., Chen, J., & Li, R. (2019). Secure binary image steganography based on LTP distortion minimization. Multimedia Tools and Applications, 78(17), 25079–25100.

    Article  Google Scholar 

  22. Jiang, C., & Pang, Y. (2020). Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimedia Tools and Applications, 79(1), 693–711.

    Article  Google Scholar 

  23. Bhardwaj, R., & Aggarwal, A. (2020). An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recognition Letters, 139, 60–68.

    Article  Google Scholar 

  24. Shaji, C., & Sam, I. S. (2021). Dual encoding approach with sequence folding for reversible data hiding in dual stego images. Multimedia Tools and Applications, 80(9), 13595–13614.

    Article  Google Scholar 

  25. Lu, W., Zhang, J., Zhao, X., Zhang, W., & Huang, J. (2020). Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding. IEEE Transactions on Circuits and Systems for Video Technology., 31, 2902–2922.

    Google Scholar 

  26. Lu, T. C., Chang, T. C., & Shen, J. J. (2020). An effective maximum distortion controlling technology in the dual-image-based reversible data hiding scheme. IEEE Access, 8, 90824–90837.

    Article  Google Scholar 

  27. Abualigah, L., Diabat, A., Mirjalili, S., Abd Elaziz, M., & Gandomi, A. H. (2021). The arithmetic optimization algorithm. Computer methods in applied mechanics and engineering, 376, 113609.

    Article  MathSciNet  MATH  Google Scholar 

  28. Zhang, L., Abdullahi, S. M., He, P., & Wang, H. (2022). Dataset mismatched steganalysis using subdomain adaptation with guiding feature. Telecommunication Systems, 80(2), 263–276.

    Article  Google Scholar 

  29. Holub, V., & Fridrich, J. (2013). Digital image steganography using universal distortion. in Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, New York, NY, 59–68.

  30. Qiao, T., Wang, S., Luo, X., & Zhu, Z. (2021). Robust steganography resisting JPEG compression by improving selection of cover element. Signal Processing, 183, 108048.

    Article  Google Scholar 

  31. Zhao, Z., Guan, Q., Zhang, H., & Zhao, X. (2018). Improving the robustness of adaptive steganographic algorithms based on transport channel matching. IEEE Transactions on Information Forensics and Security, 14(7), 1843–1856.

    Article  Google Scholar 

  32. Tao, J., Li, S., Zhang, X., & Wang, Z. (2018). Towards robust image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 29(2), 594–600.

    Article  Google Scholar 

  33. Muralidharan, T., Cohen, A., Cohen, A., & Nissim, N. (2022). The infinite race between steganography and steganalysis in images. Signal Processing, 201, 108711.

    Article  Google Scholar 

  34. Guo, L., Ni, J., & Shi, Y. Q. (2014). Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5), 814–825.

    Article  Google Scholar 

  35. Wang, Z., Yin, Z., & Zhang, X. (2018). Distortion function for JPEG steganography based on image texture and correlation in DCT domain. IETE Technical Review, 35(4), 351–358.

    Article  Google Scholar 

  36. Farah, M. A., Guesmi, R., Kachouri, A., & Samet, M. (2020). A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, 79(27), 19129–19150.

    Article  Google Scholar 

  37. Chidambaram, N., Raj, P., Thenmozhi, K., Rajagopalan, S., & Amirtharajan, R. (2019). A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimedia Tools and Applications, 78(23), 33837–33863.

    Article  Google Scholar 

  38. Setyaningsih, E., Wardoyo, R., & Sari, A. K. (2020). Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution. Digital Communications and Networks, 6(4), 486–503.

    Article  Google Scholar 

  39. Venkatraman, K., & Geetha, K. (2019). Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm. Automatika časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 60(3), 314–321.

    Google Scholar 

  40. Niyat, A. Y., Moattar, M. H., & Torshiz, M. N. (2017). Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optics and Lasers in Engineering, 90, 225–237.

    Article  Google Scholar 

  41. Ahmad, M., Doja, M. N., & Beg, M. M. S. (2021). Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. Journal of King Saud University-Computer and Information Sciences, 33(1), 77–85.

    Article  Google Scholar 

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors have made equal contributions.

Corresponding author

Correspondence to Fredy Varghese.

Ethics declarations

Conflict of interest

Authors have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to Participate

All the authors involved have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varghese, F., Sasikala, P. Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding. Wireless Pers Commun 130, 551–578 (2023). https://doi.org/10.1007/s11277-023-10298-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10298-3

Keywords

Navigation