Abstract
Image steganography is the process of concealing the confidential message in digital images. The purpose of this research is to secure the transmission of an image from attackers. This research introduced an innovative Image Hiding Encryption and Decryption (IHED) for encrypting and decrypting images. Moreover, the encoding process is performed on the Mid-frequency (MF) values are identified by a novel Mid Search African Buffalo Model (MSABM). The efficiency of the proposed model is validated by applying some attacks such as a novel White Floor Square Attack (WFSA), RS steganalysis, Chi-square attack, and visual attack. Furthermore, the proposed methodology showed that the embedded image has high Peak Signal to Noise Ratio (PSNR), embedding rate, Structural Similarity Index Metric (SSIM) and reduced Mean Square Error (MSE). Finally, the proposed strategy is compared with existing approaches and achieved better results by increasing the security of embedded secrets in the steganography system.
Similar content being viewed by others
References
AA AEL-L, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102. https://doi.org/10.1016/j.optlastec.2019.03.005
Abd El-Latif AA, Abd-El-Atty B, Elseuofi S (2020) Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications 541:123687. https://doi.org/10.1016/j.physa.2019.123687
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Diss. University of Buckingham. http://bear.buckingham.ac.uk/id/eprint/149
Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proc. SPIE 9120, Mobile multimedia/image processing, security, and applications, 912005. https://doi.org/10.1117/12.2050518
Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799–17823. https://doi.org/10.1007/s11042-019-7166-7
Agarwal P, Moudgil D, Priya S (2020) Encrypted transfer of confidential information using steganography and identity verification using face data. Artificial Intelligence and Evolutionary Computations in Engineering Systems, Springer, Singapore, pp. 155–166. https://doi.org/10.1007/978-981-15-0199-9_14
Al-Nofaie SMA, Gutub AAA (2020) Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl 79(1–2):19–67. https://doi.org/10.1007/s11042-019-08025-x
Artiemjew P, Kislak-Malinowska A (2020) Indiscernibility mask key for image steganography. Computers 9(2):38. https://doi.org/10.3390/computers9020038
Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image Steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426–437. https://doi.org/10.1016/j.measurement.2019.02.069
Biswas R, Mukherjee I, Bandyopadhyay SK (2019) Image feature based high capacity steganographic algorithm. Multimed Tools Appl 78(14):20019–20036. https://doi.org/10.1007/s11042-019-7369-y
Carpentieri B, Castiglione A, De Santis A (2020) Compression-based steganography. Concurrency and Computation: Practice and Experience 32(8):e5322. https://doi.org/10.1002/cpe.5322
Chatterjee A, Pati SK (2020) Data hiding with digital authentication in spatial domain image steganography. Computational Intelligence in Pattern Recognition, Springer, Singapore, pp. 897–907. https://doi.org/10.1007/978-981-13-9042-5_77
Chaumont M (2020) Deep learning in steganography and steganalysis. In Digital Media Steganography, Academic Press, pp. 321–349. https://doi.org/10.1016/B978-0-12-819438-6.00022-0
Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769–5789. https://doi.org/10.1007/s11042-018-6093-3
Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a U-net structure. IEEE Access 7:9314–9323. https://doi.org/10.1109/ACCESS.2019.2891247
Fakhredanesh M, Rahmati M, Safabakhsh R (2019) Steganography in discrete wavelet transform based on human visual system and cover model. Multimed Tools Appl 1(28):18475–18502. https://doi.org/10.1007/s11042-019-7238-8
Farrag S, Alexan W (2019) A high capacity geometrical domain based 3d image steganography scheme. 2019 international conference on advanced communication technologies and networking (CommNet), IEEE.
Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl:1–3. https://doi.org/10.1007/s11042-019-08427-x
Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20–32. https://doi.org/10.1016/j.cogsys.2019.11.002
Kaur R, Singh B (2020) A hybrid algorithm for robust image steganography. Multidimens Syst Signal Process:1–23. https://doi.org/10.1007/s11045-020-00725-0
Kini NG, Kini VG (2019) A secured steganography algorithm for hiding an image in an image. Integrated Intelligent Computing, Communication and Security, Springer, Singapore, pp. 539–546. https://doi.org/10.1007/978-981-10-8797-4_54
Li Y, Xiong C, Han X, Xiang R, He FY, Du H (2020) RETRACTED ARTICLE: image steganography using cosine transform with large-scale multimedia applications. Multimed Tools Appl 79(13):9665–9665. https://doi.org/10.1007/s11042-017-5557-1
Liu W, Yin X, Lu W, Zhang J, Zeng J, Shi S, Mao M (2020) Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process 167:107287. https://doi.org/10.1016/j.sigpro.2019.107287
Mansour RF, Abdelrahim EM (2019) An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidimens Syst Signal Process 30(2):791–814. https://doi.org/10.1007/s11045-018-0575-3
Mohammad AA, Al-Haj A, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl 78(6):7181–7205. https://doi.org/10.1007/s11042-018-6465-8
Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS (2019) New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7:168994–169010. https://doi.org/10.1109/ACCESS.2019.2949622
Odili JB, Fatokun JO (2020) The Mathematical Model, Implementation and the Parameter-Tuning of the African Buffalo Optimization Algorithm. 2020 International conference in mathematics, computer engineering and computer science (ICMCECS), IEEE. https://doi.org/10.1109/ICMCECS47690.2020.240886
Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener Comput Syst 111:213–225. https://doi.org/10.1016/j.future.2020.04.034
Patil AS, Patil RM, Shinde MM (2020) DWT Based Mosaic Image Steganography. Techno-Societal 2018, Springer, Cham, pp 95–107. https://doi.org/10.1007/978-3-030-16848-3_10
Qu Z, Cheng Z, Liu W, Wang X (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimed Tools Appl 78(7):7981–8001. https://doi.org/10.1007/s11042-018-6476-5
Rathor M, Sengupta A (2020) IP Core steganography using switch based key-driven hash-chaining and encoding for securing DSP kernels used in CE systems. IEEE Trans Consum Electron 66:251–260. https://doi.org/10.1109/TCE.2020.3006050
Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sensing and Imaging 21(1):1. https://doi.org/10.1007/s11220-019-0262-y
Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79(3):1865–1886. https://doi.org/10.1007/s11042-019-08221-9
Taburet T, Bas P, Sawaya W (2020) Natural steganography in JPEG domain with a linear development pipeline. IEEE Transactions on Information Forensics and Security 16:173–186. https://doi.org/10.1109/TIFS.2020.3007354
Tang W, Li B, Tan S, Barni M, Huang J (2019) CNN-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14(8):2074–2087. https://doi.org/10.1109/TIFS.2019.2891237
Valandar MY, Barani MJ, Ayubi P (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl 78(8):9971–9989. https://doi.org/10.1007/s11042-018-6584-2
Wang P, Liu F, Yang C (2020) Towards feature representation for steganalysis of spatial steganography. Signal Process 169:107422. https://doi.org/10.1016/j.sigpro.2019.107422
Zhao C, Zhao H, Wang G, Chen H (2020) Improvement SVM classification performance of Hyperspectral image using chaotic sequences in artificial bee Colony. IEEE Access 8:73947–73956. https://doi.org/10.1109/ACCESS.2020.2987865
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no potential conflict of interest.
Ethical approval
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Informed consent
For this type of study formal consent is not required.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kaur, S., Bansal, S. & Bansal, R.K. Image steganography for securing secret data using hybrid hiding model. Multimed Tools Appl 80, 7749–7769 (2021). https://doi.org/10.1007/s11042-020-09939-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09939-7