[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Integer wavelet transform based high performance secure steganography scheme QVD-LSB

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

An integer wavelet transform (IWT) based image steganography technique is proposed to prevail the embedding capacity constraints in this domain. Quotient value differencing (QVD) and 2-least significant bit (2-LSB) techniques are employed in the high frequency subbands. It divides the bit region of each coefficient of high-frequency subbands into two halves and two techniques are used concurrently in each half of the bitplane. The high-frequency subbands are divided into non-overlapping 3 \(\times \) 3 blocks and confidential messages are concealed in eight directions within each block. The low-frequency subband is fragmented into non-overlapping 2 \(\times \) 2 blocks. Since the human eye cannot tolerate more changes in low-frequency coefficients, one-fourth of the approximation subband (LL) is used to hide confidential messages. The method attains an average embedding capacity (AEC) of 3.14 bpp. To increase the safety of the technique, the confidential messages are hidden in a non-sequential way. The work resists the steganalysis test of StegExpose and outperforms the tests of the standard tool StirMark benchmark 4.0.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 1
Algorithm 2
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Singh AK (2020) Data Hiding: Current Trends, Innovation and Potential Challenges. ACM Trans Multimed Comput Commun Appl (TOMM) 16:101–117. https://doi.org/10.1145/3382772

    Article  Google Scholar 

  2. Mandal PC, Mukherjee I, Paul G, Chatterji B (2022) Digital Image Steganography: A Literature Survey. Inf Sci 609:1451–1488. https://doi.org/10.1016/j.ins.2022.07.120

    Article  Google Scholar 

  3. Liu H, Lin D, Kadir A (2013) A novel data hiding method based on deoxyribonucleic acid coding. Comput Electr Eng 39(4):1164–1173. https://doi.org/10.1016/j.compeleceng.2013.01.017

    Article  Google Scholar 

  4. Wang Y, Tang M, Wang Z (2020) High Capacity Adaptive Steganography based on LSB and Hamming Code. Optik 1–9. https://doi.org/10.1016/j.ijleo.2020.164685

  5. Li Z, He Y (2018) Steganography with Pixel Value Differencing and Modulus Function based on PSO. J Inf Secur Appl 43:47–52

    Google Scholar 

  6. Hussain M, Riaz Q, Saleem S, Ghafoor A, Jung KH (2021) Enhanced Adaptive Data Hiding Method using LSB and Pixel Value Differencing. Multimedia Tools Appl 80(13):20381–20401

    Article  Google Scholar 

  7. Kaur M, Singh S, Kaur M, Singh A, Singh D (2021) A systematic review of metaheuristic-based image encryption techniques. Arch Comput Methods Eng 1–15. https://doi.org/10.1007/s11831-021-09656-w

  8. Atta R, Ghanbari M (2021) A High Payload Data Hiding Scheme based on Dual Tree Complex Wavelet Transform. Optik 226:1–23. https://doi.org/10.1016/j.ijleo.2020.165786

  9. Benseddik ML, Zebbiche K, Azzaz MS, Sadoudi S (2022) Interpolation Based Reversible Data Hiding in the Transform Domain for Fingerprint Images. Multimed Tools Appl 81:20329–20356. https://doi.org/10.1007/s11042-022-12288-2

  10. El Salam NHA, Ismael AH, Xiong S (2022) Adaptive PVD-MPK Encoding Method in Transform Domain with a Modified Side Match Method Against Dynamic and Constant Attacks. Multimed Tools Appl 1–40. https://doi.org/10.1007/s11042-022-11995-0

  11. Liao X, Li K, Yin J (2017) Separable Data Hiding in Encrypted Image based on Compressive Sensing and Discrete Fourier Transform. Multimed Tools Appl 76(20):20739–20753. https://doi.org/10.1007/s11042-016-3971-4

    Article  Google Scholar 

  12. Hou D, Wang H, Zhang W, Yu N (2018) Reversible Data Hiding in JPEG Image based on DCT Frequency and Block Selection. Signal Process 148:41–47. https://doi.org/10.1016/j.sigpro.2018.02.002

    Article  Google Scholar 

  13. Liu G, Liu H, Kadir A et al (2012) Wavelet-based color pathological image watermark through dynamically adjusting the embedding intensity. Comput Math Methods Med 2012. https://doi.org/10.1155/2012/406349

  14. Xiong L, Zhong X, Yang CN (2020) DWT-SISA: A Secure and Effective Discrete Wavelet Transform based Secret Image Sharing with Authentication. Signal Process 1–24. https://doi.org/10.1016/j.sigpro.2020.107571

  15. Gulve AK, Joshi MS (2015) An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform using Pixel Value Differencing Approach. Math Probl Eng 2015. https://doi.org/10.1155/2015/684824

  16. Subburam S, Selvakumar S, Geetha S (2018) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimed Tools Appl 77:7071–7095. https://doi.org/10.1007/s11042-017-4622-0

    Article  Google Scholar 

  17. Kumar V, Kumar D (2018) A Modified DWT based Image Steganography Technique. Multimed Tools Appl 77(11):13279–13308. https://doi.org/10.1007/s11042-017-4947-8

    Article  Google Scholar 

  18. Thanikaiselvan V, Arulmozhivarman P (2015) RAND-STEG: An Integer Wavelet Transform Domain Digital Image Random Steganography using Knight’s Tour. Secur Commun Netw 8(13):2374–2382. https://doi.org/10.1002/sec.1185

    Article  Google Scholar 

  19. Sabeti V, Sobhani M, Hasheminejad SMH (2022) An Adaptive Image Steganography Method based on Integer Wavelet Transform using Genetic Algorithm. Comput Electr Eng 99:1–16. https://doi.org/10.1016/j.compeleceng.2022.107809

  20. Xiong L, Xu Z, Shi YQ (2018) An Integer wavelet Transform based Scheme for Reversible Data Hiding in Encrypted Images. Multidim Syst Sign Process 29(3):1191–1202. https://doi.org/10.1007/s11045-017-0497-5

    Article  MathSciNet  Google Scholar 

  21. Miri A, Faez K (2018) An Image Steganography Method Bbased on Integer Wavelet Transform. Multimed Tools Appl 77(11):13133–13144

    Article  Google Scholar 

  22. Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed E (2018) A Secure Image Steganography Algorithm based on Least Significant Bit and Integer Wavelet Transform. J Syst Eng Electron 29(3):639–649. https://doi.org/10.21629/JSEE.2018.03.21

  23. Kalita M, Tuithung T, Majumder S (2019) A New Steganography Method using Integer Wavelet Transform and Least Significant Bit Substitution. Comput J 62(11):1639–1655. https://doi.org/10.1093/comjnl/bxz014

    Article  MathSciNet  Google Scholar 

  24. Ma G, Wang J (2019) Efficient Reversible Data Hiding in Encrypted Images based on Multi-stage Integer Wavelet Transform. Signal Process Image Commun 75:55–63. https://doi.org/10.1016/j.image.2019.03.013

    Article  Google Scholar 

  25. Zhang H, Hu L (2019) A Data Hiding Scheme based on Multidirectional Line Encoding and Integer Wavelet Transform. Signal Process Image Commun 78:331–344. https://doi.org/10.1016/j.image.2019.07.019

    Article  Google Scholar 

  26. Muhuri PK, Ashraf Z, Goel S (2020) A Novel Image Steganographic Method based on Integer Wavelet Transformation and Particle Swarm Optimization. Appl Soft Comput 1–43. https://doi.org/10.1016/j.asoc.2020.106257

  27. Meng L, Liu L, Wang X, Tian G (2022) Reversible Data Hiding in Encrypted Images based on IWT and Chaotic System. Multimed Tools Appl 81(12):16833–16861. https://doi.org/10.1007/s11042-022-12415-z

    Article  Google Scholar 

  28. Sweldens W (1995) Lifting Scheme: A New Philosophy in Biorthogonal wavelet Constructions. Wavelet applications in signal and image processing III, International Society for Optics and Photonics 2569:68–79. https://doi.org/10.1117/12.217619

    Article  Google Scholar 

  29. Fridrich J, Lisoněk P, Soukal D (2006) On Steganographic Embedding Efficiency. In: International Workshop on Information Hiding. Springer, pp 282–296. https://doi.org/10.1007/978-3-540-74124-4-19

  30. Images (2019) University of Southern California. The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php. Accessed 5 Sept 2022

  31. Images (2020) The BOSSbase-1.01 Database. Binghamton University. http://dde.binghamton.edu/download/. Accessed 5 Sept 2022

  32. Atta R, Ghanbari M (2018) A High Payload Steganography Mechanism based on Wavelet Packet Transformation and Neutrosophic Set. J Vis Commun Image Represent 53:42–54. https://doi.org/10.1016/j.jvcir.2018.03.009

    Article  Google Scholar 

  33. Sahu AK, Swain G, Sahu M, Hemalatha J (2021) Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. J Inf Secur Appl 58:102808. https://doi.org/10.1016/j.jisa.2021.102808

    Article  Google Scholar 

  34. Mandal PC, Mukherjee I, Chatterji BN (2020) High Capacity Reversible and Secured Data Hiding in Images using Interpolation and Difference Expansion Technique. Multimed Tools Appl 1–22. https://doi.org/10.1007/s11042-020-09341-3

  35. Kaur M, Singh D, Kumar V (2022) Improved seven-dimensional (i7d) hyperchaotic map-based image encryption technique. Soft Comput 26(6):2689–2698. https://doi.org/10.1007/s00500-021-06423-8

    Article  Google Scholar 

  36. Mandal PC, Mukherjee I (2021) High Capacity Data Hiding based on Multi-directional Pixel Value Differencing and Decreased Difference Expansion. Multimed Tools Appl 1–23. https://doi.org/10.1007/s11042-021-11605-5

  37. Ren XX, Yang GH (2021) Kullback-Leibler Divergence-based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems. IEEE Trans Cybern 1–10. https://doi.org/10.1109/TCYB.2021.3068220

  38. Westfeld A, Pfitzmann A (1999) Attacks on Steganographic Systems. In: International workshop on information hiding. Springer, pp 61–76

  39. Boehmm E (2014) Stegexpose: A Tool for Detecting LSB Steganography. https://githubcom/b3dk7/StegExpose. Accessed 11 Jan 2023

  40. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and Imperceptible Digital Image Steganographic Algorithm based on Diamond Encoding in DWT Domain. Multimed Tools Appl 76(18):18451–18472. https://doi.org/10.1007/s11042-016-3930-0

    Article  Google Scholar 

  41. Petitcolas FA, Anderson RJ, Kuhn MG (1998) Attacks on Copyright Marking Systems. In: International Workshop on Information Hiding. Springer, pp 218–238. https://doi.org/10.1007/3-540-49380-8-16

  42. Zhang Y, Luo X, Guo Y, Qin C, Liu F (2019) Multiple robustness enhancements for image adaptive steganography in lossy channels. IEEE Trans Circ Syst Video Technol 30(8):2750–2764. https://doi.org/10.1109/TCSVT.2019.2923980

    Article  Google Scholar 

  43. Mittal A, Moorthy AK, Bovik AC (2012) No-reference image quality assessment in the spatial domain. IEEE Trans Image Process 21(12):4695–4708. https://doi.org/10.1109/TIP.2012.2214050

  44. Durafe A, Patidar V (2022) Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover. J King Saud Univ-Comput Inf Sci 34(7):4483–4498. https://doi.org/10.1016/j.jksuci.2020.10.008

    Article  Google Scholar 

  45. Himthani V, Dhaka VS, Kaur M, Rani G, Oza M, Lee HN (2022) Comparative performance assessment of deep learning based image steganography techniques. Sci Rep 12(1):16895

    Article  Google Scholar 

  46. Yang Y, Cai X, Zhang M, Xiao X (2019) Reversible Data Hiding with Different Embedding Capacity based on Optimal Embedding Strategy Selection and Image Quality Assessment Criteria. J Inf Hiding Multim Signal Process 10(2):392–407

    Google Scholar 

  47. Manikandan V, Zhang YD (2022) An adaptive pixel mapping based approach for reversible data hiding in encrypted images. Signal Process Image Commun 105:116690. https://doi.org/10.1016/j.image.2022.116690

    Article  Google Scholar 

  48. Mansouri S, Bizaki HK, Fakhredanesh M (2021) Reversible data hiding with automatic contrast enhancement using two-sided histogram expansion. J Vis Commun Image Represent 81:103359. https://doi.org/10.1016/j.jvcir.2021.103359

    Article  Google Scholar 

  49. Hsieh KS, Wang CM (2023) Multi-hider reversible data hiding using a weighted color transfer and modulus operation. Appl Sci 13(2):1013. https://doi.org/10.3390/app13021013

Download references

Funding

The authors did not receive support from any organization for this work

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pratap Chandra Mandal.

Ethics declarations

Conflicts of interests/Competing interests

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mandal, P.C., Mukherjee, I. & Chatterji, B.N. Integer wavelet transform based high performance secure steganography scheme QVD-LSB. Multimed Tools Appl 83, 62651–62675 (2024). https://doi.org/10.1007/s11042-023-17927-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17927-w

Keywords

Navigation