Abstract
Security, when referred to the context of data/information, is indeed a very vulnerable and necessary entity at present. Rigorous researches are cropping up for the betterment of the secured globe. Primarily, the term ‘Steganography’ has been in limelight to cater the extreme need of protection of sensitive and confidential data. This paper presents a two level steganographic approach of masking the secret data. This is done to facilitate data hiding and hence ensures a covert communication. On the whole, the targeted goal of this methodology is to maintain a trade-off between payload, imperceptibility and robustness. The first stage of the procedure imposes the Arnold transformation on the carrier image. The output of this stage is a scrambled image. This scrambling of pixel data bits disrupts the normal orientation of the resident pixels. Next, an N-puzzle based technique is applied on the scrambled image to promote a strategy of encryption. The concept of N-puzzle problem stands to be the base of this step. Post this stage, the output generated is a further encrypted image. Thereafter, the insertion technique of Mid Position Value (MPV) is applied to embed bits from the secret image within the above generated form of cover/carrier. After the procedure of insertion, the application of reverse N-puzzle encryption technique followed by the inverse Arnold transform fosters the final stego-image. This, on the whole, results in reverting back to the normal orientation of the original input image. All of the given experimental results highlight the outcome of the whole methodology. On this context, several of the quantitative as well as qualitative benchmark parameters have been analyzed. The results computed shows that the quality is well maintained. The generated stego is imperceptible. It also supports the non-detectability of secret data. The payload promoted in this procedure is quite high. Thus, the trade-off between the security parameters is maintained.
Similar content being viewed by others
References
Abdulla, AA. (2015). “Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography”. Doctoral thesis, University of Buckingham
Abdulla, A, Sellahewa, H, and Jassim, SA. (2014). “Steganography based on pixel intensity value decomposition”, Proc. SPIE 9120, Mobile multimedia/image processing, security, and applications, 912005
Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823
Almohammad, A, and Ghinea, G (2010). “Stego-image quality and the reliability of PSNR,” Image Processing Theory, Tools and Applications, IEEE
Al-Taani AT, AL-Issa AM (2009) A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering 3(3):574–579
Ash S, Mukherjee S, Sanyal G (2015) A DWT based Steganographic method using prime first mapping (PFM). Advances in Computing and Communicational Engineering, ICACCE, pp 471–476
Banerjee I, Indu P, Singh A et al (2015) Robust watermarking using four bit per pixel technique. Int. J. Electronic Security and Digital Forensics 7:345–357
Chandramouli R, Kharrazi M, Memon N (2003) Image steganography and Steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM (eds) . IWDW springer, pp 35–49
Dukkipati A (2012) On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl Math Comput 218:11674–11687
Elayan, MA, and Ahmad, MO (2016) “Digital Watermarking Scheme Based on Arnold and Anti-Arnold Transforms,” in Alamin Mansouri; Fathallah Nouboud; Alain Chalifour; Driss Mammass; Jean Meunier & Abderrahim Elmoataz, ed., ‘ICISP’ , Springer 317–327
Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. In: Astola J, Egiazarian KO (eds) Proc. SPIE 7532, image processing: algorithms and systems VIII
Garg, P, Kishore, RR (2020). “Performance comparison of various watermarking techniques”. Multimed Tools Appl https://doi.org/10.1007/s11042-020-09262-1
Hansen B (2015) The integrated mean squared error of series regression and a Rosenthal Hilbert-space inequality. Econometric Theory 31:337–361
Huang, P, Chang, KC, Chang, CP, and Tu, TM (2008). “A novel image steganography method using tri-way pixel value differencing,” J Multimed, 3
Jiang C, Pang Y (2020) Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl 79:693–711
Joshi, R, Gagnani, L, and Pandey, S (2013). “Image steganography with LSB” international journal of advanced research in Computer Engineering & Technology. 2
Kanan H, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14):6123–6130
Koo H, Cho N (2013). “Skew estimation of natural images based on a salient line detector”. J. Electronic imaging 22
Lan, T, Mansour, M, and Tewfik, A (2000) “Robust high capacity data embedding,” ICIP
Ma S, Liu W, Qu Z et al (2019) A self-adaptive quantum steganography algorithm based on QLSb modification in watermarked quantum image. International Journal of High Performance Computing and Networking 56(4):33–37
Mukherjee, S, Ash, S and Sanyal, G (2015). “A Novel Image Steganographic Methodology by Power Modulus Scrambling with logistic Mapping,” TENCON, IEEE Region 10 Conference
Mukherjee, S, Ash, S, and Sanyal, G (2015). “A novel image Steganographic approach by pixel position Modulus method (PPMM)” Computing for Sustainable Global Development (INDIACom)
Mukherjee, S, and Sanyal, G (2015). “A novel image steganographic technique using Position Power First Mapping (PPFM),” IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 406–410
Mukherjee, S, Sanyal, G (2017). “Enhanced Position Power First Mapping (PPFM) based Image Steganography.” International Journal of Computers and Applications (IJCA), Taylor and Francis 39:59–68
Mukherjee, S, Sanyal, G (2018). “Image steganography using mid position value technique” international conference on computational intelligence and data science (ICCIDS 2018)
Mukherjee, S, Sanyal, G (2018). “A chaos based image steganographic system”, Multimed Tools Appl, Springer
Nagpal KD, Dabhade PDS (2015) A survey on image steganography and its techniques in spatial and frequency domain. International Journal on Recent and Innovation Trends in Computing and Communication 3(2):776–779
Potdar V, Chang E (2004) Gray level modification steganography for secret communication. IEEE International Conference on Industrial Informatics, Berlin, pp 355–368
Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. CoRRabs 1601:00299
Sanchetti, A (2012). “Pixel value differencing image steganography using secret key” international journal of innovative technology and exploring engineering. 2
Sharma M (2020) Image encryption based on a new 2D logistic adjusted logistic map. Multimed Tools Appl 79:355–374
Singh AK, Kumar B, Singh KS et al (2017) Editorial note: robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications, Springer 76:3469–3469
Solemani S, Taherinia A (2017) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76:20847–20867
Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79:1865–1886
Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 79:4263–4276
Vreugdenhil, J, Iverson, K, and Katti, RS (2009). “Image Encyption using Dynamic Shuffling and XORing Processes,” in ‘ISCAS’ , IEEE, 734–737.
Wang Z, Bovik A, Sheik H et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612
Yamaguchi Y (2015) Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping. IJICT 7(1):25–39
Yin, Z, Hong, W, Tang, J, Luo, B (2016). “High capacity reversible steganography in encrypted images based on feature mining in plaintext domain”, International Journal of Embedded Systems (IJES), Vol. 8, No. 2/3
Yuksel, M, Liu, X, and Erkip, E (2009). “A Secure Communication Game with a Relay Helping the Eavesdropper,” CoRR abs/0911.0089
Zhang, J., Mao, J. (2017). “Anonymous multi-receiver broadcast encryption scheme with strong security”, International Journal of Embedded Systems (IJES), Vol. 9, No. 2
Zheng, Q, Wang, X, Khan, K et al. (2017). “A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.” IEEE Access. pp. 1–1
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mukherjee, S., Sanyal, G. Image steganography with N-puzzle encryption. Multimed Tools Appl 79, 29951–29975 (2020). https://doi.org/10.1007/s11042-020-09522-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09522-0