Skip to main content

Advertisement

Log in

Bifold-crypto-chaotic steganography for visual data security

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

As digital images hold sensitive information from a number of areas, such as human, medical, satellite and biometric, etc., they therefore require the utmost protection. These photos hold various vulnerability threats and in this era of cloud and virtualization, to protect data from hackers, we need an efficient way to safeguard data that would provide a hybrid type of algorithm to protect data from multiple types of hackers. The approach is innovative and safe in the sense that it has two-fold protections for the safety of a secret message or information. Secret message is encrypted twice with Arnold and Logistic maps prior to transmission. The approach effectively blends the two aspects of visual data security with the integration of a chaotic mechanism in such a manner that optimal security can be obtained. The aim is to conceal a message or plain text and at the same time protect it by encrypting hidden keys and by means of DWT and a chaotic phenomenon. Therefore, by integrating these two approaches, the new approach conceptualizes dual encryption. Numerous metric studies, such as PSNR, MSE, correlation coefficient and SSIM, have been carried out for validation purposes. The results demonstrate that the system performs well with various grayscale images and outperforms cryptography and steganography alone in terms of security and reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

No.

References

  1. Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2016) Image encryption scheme for secure digital images based on 3D cat map and Turing machine. In Proceedings of the 2015 7th International Conference of Soft Computing and Pattern Recognition, SoCPaR 2015. https://doi.org/10.1109/SOCPAR.2015.7492812

  2. Neeta D, Snehal K, Jacobs D (2006) Implementation of LSB steganography and its evaluation for various bits. In 2006 1st International Conference on Digital Information Management, ICDIM. https://doi.org/10.1109/ICDIM.2007.369349

  3. Singh G, Shrivastava S, Singh A (2015) Analytic survey on various techniques of image steganography. Int J Comput Appl 132:1. https://doi.org/10.5120/ijca2015907271

    Article  Google Scholar 

  4. Nevriyanto A, Sutarno S, Siswanti SD, Erwin E (2019) Image steganography using combine of discrete wavelet transform and singular value decomposition for more robustness and higher peak signal noise ratio. In Proceedings of 2018 International Conference on Electrical Engineering and Computer Science, ICECOS 2018. https://doi.org/10.1109/ICECOS.2018.8605205

  5. Soni A, Jain J, Roshan R (2013) Image steganography using discrete fractional Fourier transform. In 2013 International Conference on Intelligent Systems and Signal Processing, ISSP 2013, https://doi.org/10.1109/ISSP.2013.6526882

  6. Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci. https://doi.org/10.1016/j.procs.2015.02.105

    Article  Google Scholar 

  7. Nasrullah N, Sang J, Mateen M, Akbar MA, Xiang H, Xia X (2019) Reversible data hiding in compressed and encrypted images by using Kd-tree. Multimed Tools Appl 78:13. https://doi.org/10.1007/s11042-018-7130-y

    Article  Google Scholar 

  8. Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2852771

    Article  Google Scholar 

  9. Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a U-net structure. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2891247

    Article  Google Scholar 

  10. Gaurav K, Ghanekar U (2018) Image steganography based on Canny edge detection, dilation operator and hybrid coding. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2018.05.001

    Article  Google Scholar 

  11. Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77:11. https://doi.org/10.1007/s11042-017-4947-8

    Article  Google Scholar 

  12. Kasapbasi MC (2019) A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2946807

    Article  Google Scholar 

  13. Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79:3–4. https://doi.org/10.1007/s11042-019-08221-9

    Article  Google Scholar 

  14. Rustad S, Setiadi DRIM, Syukur A, Andono PN (2021) Inverted LSB image steganography using adaptive pattern to improve imperceptibility. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2020.12.017

    Article  Google Scholar 

  15. Shah PD, Bichkar RS (2021) Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure. Eng Sci Technol Int J. https://doi.org/10.1016/j.jestch.2020.11.008

    Article  Google Scholar 

  16. Ashraf Z, Roy ML, Muhuri PK, Lohani QMD (2020) Interval type-2 fuzzy logic system based similarity evaluation for image steganography. Heliyon. https://doi.org/10.1016/j.heliyon.2020.e03771

    Article  Google Scholar 

  17. Shyla MK, Kumar KBS, Das RK (2021) Image steganography using genetic algorithm for cover image selection and embedding. Soft Comput Lett. https://doi.org/10.1016/j.socl.2021.100021

    Article  Google Scholar 

  18. Wahab OFA, Khalaf AAM, Hussein AI, Hamed HFA (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3060317

    Article  Google Scholar 

  19. Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK (2021) SSII: Secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3089357

    Article  Google Scholar 

  20. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press

    MATH  Google Scholar 

  21. Ferdush J, Begum M, Uddin MS (2021) Chaotic lightweight cryptosystem for image encryption. Adv Multimed. https://doi.org/10.1155/2021/5527295

    Article  Google Scholar 

  22. Wang C, Ding Q (2018) A new two-dimensional map with hidden attractors. Entropy. https://doi.org/10.3390/e20050322

    Article  MathSciNet  Google Scholar 

  23. Zhu S, Zhu C, Wang W (2018) A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2874336

    Article  Google Scholar 

  24. Gulve AK, Joshi MS (2015) An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math Probl Eng. https://doi.org/10.1155/2015/684824

    Article  Google Scholar 

  25. Salunke BA, Salunke S (2016) Analysis of encrypted images using discrete fractional transforms viz. DFrFT, DFrST and DFrCT. In International Conference on Communication and Signal Processing, ICCSP 2016. https://doi.org/10.1109/ICCSP.2016.7754390

  26. Jridi M, Alfalou A (2018) Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators. Opt Lasers Eng 102:59–69. https://doi.org/10.1016/j.optlaseng.2017.10.007

    Article  Google Scholar 

  27. Weber A (2020) The USC-SIPI Image Database. USC Viterbi School of Engineering. http://sipi.usc.edu/database. Accessed 20 Sept 2020

Download references

Funding

No funding available.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharti Ahuja.

Ethics declarations

Conflict of interest

The author declared that they have no conflict of interest.

Ethical approval

NA.

Consent to participate

Yes.

Consent for publication

Yes.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahuja, B., Doriya, R. Bifold-crypto-chaotic steganography for visual data security. Int. j. inf. tecnol. 14, 637–648 (2022). https://doi.org/10.1007/s41870-022-00861-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-00861-9

Keywords

Navigation