Skip to main content
Log in

Image steganography for securing secret data using hybrid hiding model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image steganography is the process of concealing the confidential message in digital images. The purpose of this research is to secure the transmission of an image from attackers. This research introduced an innovative Image Hiding Encryption and Decryption (IHED) for encrypting and decrypting images. Moreover, the encoding process is performed on the Mid-frequency (MF) values are identified by a novel Mid Search African Buffalo Model (MSABM). The efficiency of the proposed model is validated by applying some attacks such as a novel White Floor Square Attack (WFSA), RS steganalysis, Chi-square attack, and visual attack. Furthermore, the proposed methodology showed that the embedded image has high Peak Signal to Noise Ratio (PSNR), embedding rate, Structural Similarity Index Metric (SSIM) and reduced Mean Square Error (MSE). Finally, the proposed strategy is compared with existing approaches and achieved better results by increasing the security of embedded secrets in the steganography system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. AA AEL-L, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102. https://doi.org/10.1016/j.optlastec.2019.03.005

    Article  Google Scholar 

  2. Abd El-Latif AA, Abd-El-Atty B, Elseuofi S (2020) Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications 541:123687. https://doi.org/10.1016/j.physa.2019.123687

    Article  MathSciNet  Google Scholar 

  3. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Diss. University of Buckingham. http://bear.buckingham.ac.uk/id/eprint/149

  4. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proc. SPIE 9120, Mobile multimedia/image processing, security, and applications, 912005. https://doi.org/10.1117/12.2050518

  5. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799–17823. https://doi.org/10.1007/s11042-019-7166-7

    Article  Google Scholar 

  6. Agarwal P, Moudgil D, Priya S (2020) Encrypted transfer of confidential information using steganography and identity verification using face data. Artificial Intelligence and Evolutionary Computations in Engineering Systems, Springer, Singapore, pp. 155–166. https://doi.org/10.1007/978-981-15-0199-9_14

  7. Al-Nofaie SMA, Gutub AAA (2020) Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications. Multimed Tools Appl 79(1–2):19–67. https://doi.org/10.1007/s11042-019-08025-x

    Article  Google Scholar 

  8. Artiemjew P, Kislak-Malinowska A (2020) Indiscernibility mask key for image steganography. Computers 9(2):38. https://doi.org/10.3390/computers9020038

    Article  Google Scholar 

  9. Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image Steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426–437. https://doi.org/10.1016/j.measurement.2019.02.069

    Article  Google Scholar 

  10. Biswas R, Mukherjee I, Bandyopadhyay SK (2019) Image feature based high capacity steganographic algorithm. Multimed Tools Appl 78(14):20019–20036. https://doi.org/10.1007/s11042-019-7369-y

    Article  Google Scholar 

  11. Carpentieri B, Castiglione A, De Santis A (2020) Compression-based steganography. Concurrency and Computation: Practice and Experience 32(8):e5322. https://doi.org/10.1002/cpe.5322

    Article  Google Scholar 

  12. Chatterjee A, Pati SK (2020) Data hiding with digital authentication in spatial domain image steganography. Computational Intelligence in Pattern Recognition, Springer, Singapore, pp. 897–907. https://doi.org/10.1007/978-981-13-9042-5_77

  13. Chaumont M (2020) Deep learning in steganography and steganalysis. In Digital Media Steganography, Academic Press, pp. 321–349. https://doi.org/10.1016/B978-0-12-819438-6.00022-0

  14. Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769–5789. https://doi.org/10.1007/s11042-018-6093-3

    Article  Google Scholar 

  15. Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a U-net structure. IEEE Access 7:9314–9323. https://doi.org/10.1109/ACCESS.2019.2891247

    Article  Google Scholar 

  16. Fakhredanesh M, Rahmati M, Safabakhsh R (2019) Steganography in discrete wavelet transform based on human visual system and cover model. Multimed Tools Appl 1(28):18475–18502. https://doi.org/10.1007/s11042-019-7238-8

    Article  Google Scholar 

  17. Farrag S, Alexan W (2019) A high capacity geometrical domain based 3d image steganography scheme. 2019 international conference on advanced communication technologies and networking (CommNet), IEEE.

  18. Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl:1–3. https://doi.org/10.1007/s11042-019-08427-x

  19. Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20–32. https://doi.org/10.1016/j.cogsys.2019.11.002

    Article  Google Scholar 

  20. Kaur R, Singh B (2020) A hybrid algorithm for robust image steganography. Multidimens Syst Signal Process:1–23. https://doi.org/10.1007/s11045-020-00725-0

  21. Kini NG, Kini VG (2019) A secured steganography algorithm for hiding an image in an image. Integrated Intelligent Computing, Communication and Security, Springer, Singapore, pp. 539–546. https://doi.org/10.1007/978-981-10-8797-4_54

  22. Li Y, Xiong C, Han X, Xiang R, He FY, Du H (2020) RETRACTED ARTICLE: image steganography using cosine transform with large-scale multimedia applications. Multimed Tools Appl 79(13):9665–9665. https://doi.org/10.1007/s11042-017-5557-1

    Article  Google Scholar 

  23. Liu W, Yin X, Lu W, Zhang J, Zeng J, Shi S, Mao M (2020) Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process 167:107287. https://doi.org/10.1016/j.sigpro.2019.107287

    Article  Google Scholar 

  24. Mansour RF, Abdelrahim EM (2019) An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidimens Syst Signal Process 30(2):791–814. https://doi.org/10.1007/s11045-018-0575-3

    Article  MATH  Google Scholar 

  25. Mohammad AA, Al-Haj A, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl 78(6):7181–7205. https://doi.org/10.1007/s11042-018-6465-8

    Article  Google Scholar 

  26. Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS (2019) New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7:168994–169010. https://doi.org/10.1109/ACCESS.2019.2949622

    Article  Google Scholar 

  27. Odili JB, Fatokun JO (2020) The Mathematical Model, Implementation and the Parameter-Tuning of the African Buffalo Optimization Algorithm. 2020 International conference in mathematics, computer engineering and computer science (ICMCECS), IEEE. https://doi.org/10.1109/ICMCECS47690.2020.240886

  28. Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener Comput Syst 111:213–225. https://doi.org/10.1016/j.future.2020.04.034

    Article  Google Scholar 

  29. Patil AS, Patil RM, Shinde MM (2020) DWT Based Mosaic Image Steganography. Techno-Societal 2018, Springer, Cham, pp 95–107. https://doi.org/10.1007/978-3-030-16848-3_10

  30. Qu Z, Cheng Z, Liu W, Wang X (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimed Tools Appl 78(7):7981–8001. https://doi.org/10.1007/s11042-018-6476-5

    Article  Google Scholar 

  31. Rathor M, Sengupta A (2020) IP Core steganography using switch based key-driven hash-chaining and encoding for securing DSP kernels used in CE systems. IEEE Trans Consum Electron 66:251–260. https://doi.org/10.1109/TCE.2020.3006050

    Article  Google Scholar 

  32. Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sensing and Imaging 21(1):1. https://doi.org/10.1007/s11220-019-0262-y

    Article  Google Scholar 

  33. Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79(3):1865–1886. https://doi.org/10.1007/s11042-019-08221-9

    Article  Google Scholar 

  34. Taburet T, Bas P, Sawaya W (2020) Natural steganography in JPEG domain with a linear development pipeline. IEEE Transactions on Information Forensics and Security 16:173–186. https://doi.org/10.1109/TIFS.2020.3007354

    Article  Google Scholar 

  35. Tang W, Li B, Tan S, Barni M, Huang J (2019) CNN-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14(8):2074–2087. https://doi.org/10.1109/TIFS.2019.2891237

    Article  Google Scholar 

  36. Valandar MY, Barani MJ, Ayubi P (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl 78(8):9971–9989. https://doi.org/10.1007/s11042-018-6584-2

    Article  Google Scholar 

  37. Wang P, Liu F, Yang C (2020) Towards feature representation for steganalysis of spatial steganography. Signal Process 169:107422. https://doi.org/10.1016/j.sigpro.2019.107422

    Article  Google Scholar 

  38. Zhao C, Zhao H, Wang G, Chen H (2020) Improvement SVM classification performance of Hyperspectral image using chaotic sequences in artificial bee Colony. IEEE Access 8:73947–73956. https://doi.org/10.1109/ACCESS.2020.2987865

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumeet Kaur.

Ethics declarations

Conflict of interest

The authors declare that they have no potential conflict of interest.

Ethical approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed consent

For this type of study formal consent is not required.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, S., Bansal, S. & Bansal, R.K. Image steganography for securing secret data using hybrid hiding model. Multimed Tools Appl 80, 7749–7769 (2021). https://doi.org/10.1007/s11042-020-09939-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09939-7

Keywords

Navigation