Abstract
As digital images hold sensitive information from a number of areas, such as human, medical, satellite and biometric, etc., they therefore require the utmost protection. These photos hold various vulnerability threats and in this era of cloud and virtualization, to protect data from hackers, we need an efficient way to safeguard data that would provide a hybrid type of algorithm to protect data from multiple types of hackers. The approach is innovative and safe in the sense that it has two-fold protections for the safety of a secret message or information. Secret message is encrypted twice with Arnold and Logistic maps prior to transmission. The approach effectively blends the two aspects of visual data security with the integration of a chaotic mechanism in such a manner that optimal security can be obtained. The aim is to conceal a message or plain text and at the same time protect it by encrypting hidden keys and by means of DWT and a chaotic phenomenon. Therefore, by integrating these two approaches, the new approach conceptualizes dual encryption. Numerous metric studies, such as PSNR, MSE, correlation coefficient and SSIM, have been carried out for validation purposes. The results demonstrate that the system performs well with various grayscale images and outperforms cryptography and steganography alone in terms of security and reliability.
Similar content being viewed by others
Data availability
No.
References
Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2016) Image encryption scheme for secure digital images based on 3D cat map and Turing machine. In Proceedings of the 2015 7th International Conference of Soft Computing and Pattern Recognition, SoCPaR 2015. https://doi.org/10.1109/SOCPAR.2015.7492812
Neeta D, Snehal K, Jacobs D (2006) Implementation of LSB steganography and its evaluation for various bits. In 2006 1st International Conference on Digital Information Management, ICDIM. https://doi.org/10.1109/ICDIM.2007.369349
Singh G, Shrivastava S, Singh A (2015) Analytic survey on various techniques of image steganography. Int J Comput Appl 132:1. https://doi.org/10.5120/ijca2015907271
Nevriyanto A, Sutarno S, Siswanti SD, Erwin E (2019) Image steganography using combine of discrete wavelet transform and singular value decomposition for more robustness and higher peak signal noise ratio. In Proceedings of 2018 International Conference on Electrical Engineering and Computer Science, ICECOS 2018. https://doi.org/10.1109/ICECOS.2018.8605205
Soni A, Jain J, Roshan R (2013) Image steganography using discrete fractional Fourier transform. In 2013 International Conference on Intelligent Systems and Signal Processing, ISSP 2013, https://doi.org/10.1109/ISSP.2013.6526882
Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci. https://doi.org/10.1016/j.procs.2015.02.105
Nasrullah N, Sang J, Mateen M, Akbar MA, Xiang H, Xia X (2019) Reversible data hiding in compressed and encrypted images by using Kd-tree. Multimed Tools Appl 78:13. https://doi.org/10.1007/s11042-018-7130-y
Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2852771
Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a U-net structure. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2891247
Gaurav K, Ghanekar U (2018) Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2018.05.001
Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77:11. https://doi.org/10.1007/s11042-017-4947-8
Kasapbasi MC (2019) A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2946807
Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79:3–4. https://doi.org/10.1007/s11042-019-08221-9
Rustad S, Setiadi DRIM, Syukur A, Andono PN (2021) Inverted LSB image steganography using adaptive pattern to improve imperceptibility. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2020.12.017
Shah PD, Bichkar RS (2021) Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure. Eng Sci Technol Int J. https://doi.org/10.1016/j.jestch.2020.11.008
Ashraf Z, Roy ML, Muhuri PK, Lohani QMD (2020) Interval type-2 fuzzy logic system based similarity evaluation for image steganography. Heliyon. https://doi.org/10.1016/j.heliyon.2020.e03771
Shyla MK, Kumar KBS, Das RK (2021) Image steganography using genetic algorithm for cover image selection and embedding. Soft Comput Lett. https://doi.org/10.1016/j.socl.2021.100021
Wahab OFA, Khalaf AAM, Hussein AI, Hamed HFA (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3060317
Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK (2021) SSII: Secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3089357
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press
Ferdush J, Begum M, Uddin MS (2021) Chaotic lightweight cryptosystem for image encryption. Adv Multimed. https://doi.org/10.1155/2021/5527295
Wang C, Ding Q (2018) A new two-dimensional map with hidden attractors. Entropy. https://doi.org/10.3390/e20050322
Zhu S, Zhu C, Wang W (2018) A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2874336
Gulve AK, Joshi MS (2015) An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math Probl Eng. https://doi.org/10.1155/2015/684824
Salunke BA, Salunke S (2016) Analysis of encrypted images using discrete fractional transforms viz. DFrFT, DFrST and DFrCT. In International Conference on Communication and Signal Processing, ICCSP 2016. https://doi.org/10.1109/ICCSP.2016.7754390
Jridi M, Alfalou A (2018) Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators. Opt Lasers Eng 102:59–69. https://doi.org/10.1016/j.optlaseng.2017.10.007
Weber A (2020) The USC-SIPI Image Database. USC Viterbi School of Engineering. http://sipi.usc.edu/database. Accessed 20 Sept 2020
Funding
No funding available.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declared that they have no conflict of interest.
Ethical approval
NA.
Consent to participate
Yes.
Consent for publication
Yes.
Rights and permissions
About this article
Cite this article
Ahuja, B., Doriya, R. Bifold-crypto-chaotic steganography for visual data security. Int. j. inf. tecnol. 14, 637–648 (2022). https://doi.org/10.1007/s41870-022-00861-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-022-00861-9