Skip to main content
Log in

Image steganography with N-puzzle encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Security, when referred to the context of data/information, is indeed a very vulnerable and necessary entity at present. Rigorous researches are cropping up for the betterment of the secured globe. Primarily, the term ‘Steganography’ has been in limelight to cater the extreme need of protection of sensitive and confidential data. This paper presents a two level steganographic approach of masking the secret data. This is done to facilitate data hiding and hence ensures a covert communication. On the whole, the targeted goal of this methodology is to maintain a trade-off between payload, imperceptibility and robustness. The first stage of the procedure imposes the Arnold transformation on the carrier image. The output of this stage is a scrambled image. This scrambling of pixel data bits disrupts the normal orientation of the resident pixels. Next, an N-puzzle based technique is applied on the scrambled image to promote a strategy of encryption. The concept of N-puzzle problem stands to be the base of this step. Post this stage, the output generated is a further encrypted image. Thereafter, the insertion technique of Mid Position Value (MPV) is applied to embed bits from the secret image within the above generated form of cover/carrier. After the procedure of insertion, the application of reverse N-puzzle encryption technique followed by the inverse Arnold transform fosters the final stego-image. This, on the whole, results in reverting back to the normal orientation of the original input image. All of the given experimental results highlight the outcome of the whole methodology. On this context, several of the quantitative as well as qualitative benchmark parameters have been analyzed. The results computed shows that the quality is well maintained. The generated stego is imperceptible. It also supports the non-detectability of secret data. The payload promoted in this procedure is quite high. Thus, the trade-off between the security parameters is maintained.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abdulla, AA. (2015). “Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography”. Doctoral thesis, University of Buckingham

  2. Abdulla, A, Sellahewa, H, and Jassim, SA. (2014). “Steganography based on pixel intensity value decomposition”, Proc. SPIE 9120, Mobile multimedia/image processing, security, and applications, 912005

  3. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823

    Article  Google Scholar 

  4. Almohammad, A, and Ghinea, G (2010). “Stego-image quality and the reliability of PSNR,” Image Processing Theory, Tools and Applications, IEEE

  5. Al-Taani AT, AL-Issa AM (2009) A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering 3(3):574–579

    Google Scholar 

  6. Ash S, Mukherjee S, Sanyal G (2015) A DWT based Steganographic method using prime first mapping (PFM). Advances in Computing and Communicational Engineering, ICACCE, pp 471–476

    Google Scholar 

  7. Banerjee I, Indu P, Singh A et al (2015) Robust watermarking using four bit per pixel technique. Int. J. Electronic Security and Digital Forensics 7:345–357

    Article  Google Scholar 

  8. Chandramouli R, Kharrazi M, Memon N (2003) Image steganography and Steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM (eds) . IWDW springer, pp 35–49

  9. Dukkipati A (2012) On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl Math Comput 218:11674–11687

    MathSciNet  MATH  Google Scholar 

  10. Elayan, MA, and Ahmad, MO (2016) “Digital Watermarking Scheme Based on Arnold and Anti-Arnold Transforms,” in Alamin Mansouri; Fathallah Nouboud; Alain Chalifour; Driss Mammass; Jean Meunier & Abderrahim Elmoataz, ed., ‘ICISP’ , Springer 317–327

  11. Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. In: Astola J, Egiazarian KO (eds) Proc. SPIE 7532, image processing: algorithms and systems VIII

    Google Scholar 

  12. Garg, P, Kishore, RR (2020). “Performance comparison of various watermarking techniques”. Multimed Tools Appl https://doi.org/10.1007/s11042-020-09262-1

  13. Hansen B (2015) The integrated mean squared error of series regression and a Rosenthal Hilbert-space inequality. Econometric Theory 31:337–361

    Article  MathSciNet  Google Scholar 

  14. Huang, P, Chang, KC, Chang, CP, and Tu, TM (2008). “A novel image steganography method using tri-way pixel value differencing,” J Multimed, 3

  15. Jiang C, Pang Y (2020) Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl 79:693–711

    Article  Google Scholar 

  16. Joshi, R, Gagnani, L, and Pandey, S (2013). “Image steganography with LSB” international journal of advanced research in Computer Engineering & Technology. 2

  17. Kanan H, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41(14):6123–6130

    Article  Google Scholar 

  18. Koo H, Cho N (2013). “Skew estimation of natural images based on a salient line detector”. J. Electronic imaging 22

  19. Lan, T, Mansour, M, and Tewfik, A (2000) “Robust high capacity data embedding,” ICIP

  20. Ma S, Liu W, Qu Z et al (2019) A self-adaptive quantum steganography algorithm based on QLSb modification in watermarked quantum image. International Journal of High Performance Computing and Networking 56(4):33–37

    Google Scholar 

  21. Mukherjee, S, Ash, S and Sanyal, G (2015). “A Novel Image Steganographic Methodology by Power Modulus Scrambling with logistic Mapping,” TENCON, IEEE Region 10 Conference

  22. Mukherjee, S, Ash, S, and Sanyal, G (2015). “A novel image Steganographic approach by pixel position Modulus method (PPMM)” Computing for Sustainable Global Development (INDIACom)

  23. Mukherjee, S, and Sanyal, G (2015). “A novel image steganographic technique using Position Power First Mapping (PPFM),” IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 406–410

  24. Mukherjee, S, Sanyal, G (2017). “Enhanced Position Power First Mapping (PPFM) based Image Steganography.” International Journal of Computers and Applications (IJCA), Taylor and Francis 39:59–68

  25. Mukherjee, S, Sanyal, G (2018). “Image steganography using mid position value technique” international conference on computational intelligence and data science (ICCIDS 2018)

  26. Mukherjee, S, Sanyal, G (2018). “A chaos based image steganographic system”, Multimed Tools Appl, Springer

  27. Nagpal KD, Dabhade PDS (2015) A survey on image steganography and its techniques in spatial and frequency domain. International Journal on Recent and Innovation Trends in Computing and Communication 3(2):776–779

    Article  Google Scholar 

  28. Potdar V, Chang E (2004) Gray level modification steganography for secret communication. IEEE International Conference on Industrial Informatics, Berlin, pp 355–368

    Google Scholar 

  29. Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. CoRRabs 1601:00299

    Google Scholar 

  30. Sanchetti, A (2012). “Pixel value differencing image steganography using secret key” international journal of innovative technology and exploring engineering. 2

  31. Sharma M (2020) Image encryption based on a new 2D logistic adjusted logistic map. Multimed Tools Appl 79:355–374

    Article  Google Scholar 

  32. Singh AK, Kumar B, Singh KS et al (2017) Editorial note: robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications, Springer 76:3469–3469

    Article  Google Scholar 

  33. Solemani S, Taherinia A (2017) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76:20847–20867

    Article  Google Scholar 

  34. Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79:1865–1886

    Article  Google Scholar 

  35. Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 79:4263–4276

    Article  Google Scholar 

  36. Vreugdenhil, J, Iverson, K, and Katti, RS (2009). “Image Encyption using Dynamic Shuffling and XORing Processes,” in ‘ISCAS’ , IEEE, 734–737.

  37. Wang Z, Bovik A, Sheik H et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  38. Yamaguchi Y (2015) Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping. IJICT 7(1):25–39

    Article  MathSciNet  Google Scholar 

  39. Yin, Z, Hong, W, Tang, J, Luo, B (2016). “High capacity reversible steganography in encrypted images based on feature mining in plaintext domain”, International Journal of Embedded Systems (IJES), Vol. 8, No. 2/3

  40. Yuksel, M, Liu, X, and Erkip, E (2009). “A Secure Communication Game with a Relay Helping the Eavesdropper,” CoRR abs/0911.0089

  41. Zhang, J., Mao, J. (2017). “Anonymous multi-receiver broadcast encryption scheme with strong security”, International Journal of Embedded Systems (IJES), Vol. 9, No. 2

  42. Zheng, Q, Wang, X, Khan, K et al. (2017). “A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.” IEEE Access. pp. 1–1

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Goutam Sanyal.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee, S., Sanyal, G. Image steganography with N-puzzle encryption. Multimed Tools Appl 79, 29951–29975 (2020). https://doi.org/10.1007/s11042-020-09522-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09522-0

Keywords

Navigation