Skip to main content
Log in

An efficient multi-bit steganography algorithm in spatial domain with two-layer security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is a very useful technique which aims at preventing loss of privacy during the process of data communication, especially over the internet. It can involve different forms of media like image, video (i.e., image sequence), audio etc. We propose a novel steganographic approach in spatial domain using pixel value differencing (PVD) or sample value differencing (SVD) technique and Galois field (GF (28)) operations in order to provide a two layered security for hiding message bits. Our method not only has a very high embedding capacity, but is also capable of withstanding statistical attacks. The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2017) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur Gener Comput Syst 78, Part 3:1005–1019. https://doi.org/10.1016/j.future.2016.12.028. ISSN. 0167-739X

    Google Scholar 

  2. Boehmm B (2014) Stegexpose a tool for detecting LSB steganography. https://github.com/b3dk7/StegExpose

  3. Burrows M, Abadi M, Needham R (1990) A logic of authentication. DEC SRC Research Report 39

  4. Chakraborty S, Singh JA, Bhatnagar C (2017) LSB Based non blind predictive edge adaptive image steganography. Multimedia Tools Appls 76:7973–7987. https://doi.org/10.1007/s11042-016-3449-4. ISSN. 1573-7721

    Article  Google Scholar 

  5. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. In: International conference on IEEE image processing. ISBN: 0-7803-7622-6, vol 3, pp 641–644, https://doi.org/10.1109/ICIP.2002.1039052

  6. Farahani B, Firouzi F, Chang V, Badaroglu M, Constant N, Mankodiya K (2017) Towards fog-driven IoT ehealth: promises and challenges of IoT in medicine and healthcare. Futur Gener Comput Syst 78 Part 2:659–676. https://doi.org/10.1016/j.future.2017.04.036

    Google Scholar 

  7. Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Secur 10(2):243–255. https://doi.org/10.1109/TIFS.2014.2368364

    Article  Google Scholar 

  8. Fridrich J, Lisonek P (2007) Grid colorings in steganography. IEEE Trans Inf Theory 53(4):1547–1549. https://doi.org/10.1109/TIT.2007.892768

    Article  MathSciNet  MATH  Google Scholar 

  9. Fridrich J, Lisonek P, Soukal D (2007) On steganographic embedding efficiency. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) IH 2006. LNCS. ISBN. 978-3-540-74124-4, vol 4437. Springer, Heidelberg, pp 282–296, https://doi.org/10.1007/978-3-540-74124-4_19

  10. Hashim AT, Ali YH, Ghazoul SS (2011) Developed method of information hiding in video AVI file based on hybrid encryption and steganography. Eng Tech J 29 (2):359–373. ISSN. 16816900 24120758

    Google Scholar 

  11. Hemlatha S, Dinesh A, Renuka A (2015) Wavelet transform based steganography technique to hide audio signals in image. In: Elsevier B.V. graph algorithms, high performance implementations and its applications, vol 47, pp 272–281. https://doi.org/10.1016/j.procs.2015.03.207

  12. Hrytskiv Z, Voloshynovskiy S, Rytsar Y (1998) Cryptography and steganography of video information in modern communications. In: Third international conference on telecommunications in modern satelite, cable and broadcasting services TELSIKS’97, vol 11, No. 1, pp 164–167

  13. Hu SD, Kin Tak U (2011) A novel video steganography based on non-uniform rectangular partition. In: IEEE international conference on computational science and engineering. ISBN. 978-1-4577-0974-6, pp 57–61, https://doi.org/10.1109/CSE.2011.24

  14. Huang X, Kawashima R, Segawa N, Abe Y (2008) Design and implementation of synchronized audio to audio steganography scheme. In: International conference on intelligent information hiding and multimedia signal processing (IIHMSP). ISBN: 978-0-7695-3278-3. IEEE Xplore, pp 331–334, https://doi.org/10.1109/IIH-MSP.2008.98

  15. Huayong G, Huang M, Wang Q (2011) Steganography and steganalysis based on digital image. In: 4th international congress on image and signal processing (CISP), vol 1. IEEE, pp 252–255. https://doi.org/10.1109/CISP.2011.6099953

  16. Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on LSB insertion and encryption. In: Advances in recent technologies in communication and computing, ARTCom ’09. IEEE, pp 302–305. https://doi.org/10.1109/ARTCom.2009.228

  17. Kak A (2015) Lecture notes on computer and network security. Purdue University

  18. Kim C (2014) Data hiding by an improved exploiting modification direction. Multimedia Tools and Applications 69 (3):569–584. https://doi.org/10.1007/s11042-012-1114-0

    Article  Google Scholar 

  19. Kim C, Shin DK, Shin DI, Zhang X (2011) Improved steganographic embedding exploiting modification direction in multimedia communications. Commun Comput Inf Sci 186:130–138. https://doi.org/10.1007/978-3-642-22339-6_16

    Google Scholar 

  20. Kumar H, Anuradha (2012) Enhanced LSB technique for audio steganography. In: Computing communication networking technologies (ICCCNT) third international conference. IEEE, pp 1–4. https://doi.org/10.1109/ICCCNT.2012.6395978

  21. Liao D, Sun G, Li H, Yu H, Chang V (2017) The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Clust Comput, Springer 20(3):2283–2297. https://doi.org/10.1007/s10586-017-0986-1

    Article  Google Scholar 

  22. Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimedia 12(5):345–357. https://doi.org/10.1109/TMM.2010.2051243

    Article  Google Scholar 

  23. Lou D, Hub C (2012) LSB Steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. In: Information sciences. Elsevier, pp 346–358. https://doi.org/10.1016/j.ins.2011.06.003

  24. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812

    Article  Google Scholar 

  25. Maya ST, Merico N, Meana HP (2006) An image steganography systems based on BPCS and IWT. In: 16th IEEE international conference on electronics, communications and computers (CONIELECOMP), p 51. https://doi.org/10.1109/CONIELECOMP.2006.14

  26. Miller E, Sturmfels B (2006) Combinatorial commutative algebra. Springer, New York

    MATH  Google Scholar 

  27. Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using hamming code (7, 4), systems. In: Applications and technology conference (LISAT), IEEE Long Island, pp 1–6. https://doi.org/10.1109/LISAT.2014.6845191

  28. Mukherjee I, Paul G (2013) Efficient multi-bit image steganography in spatial domain. In: Information systems security, chapter 21, lecture notes, vol 8303. Springer, pp 270–284. https://doi.org/10.1007/978-3-642-45204-8_21

  29. Mukherjee N, Bhattacharya A, Bose S (2013) Evolutionary multibit grouping steganographic algorithm. In: Information systems security, LNCS, vol 8303. Springer, pp 285–296. https://doi.org/10.1007/978-3-642-45204-8_22

  30. Paul G, Davidson I, Mukherjee I, Ravi S (2012) Keyless steganography in spatial domain using energetic pixels. In: Venkatakrishnan V, Goswami D (eds) ICISS 2012, LNCS, vol 7671. Springer, pp 134–148. https://doi.org/10.1007/978-3-642-35130-3_10

  31. Paul G, Davidson I, Mukherjee I, Ravi S (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 75:1–27. ISBN: 978-3-642-35129-7

    Article  Google Scholar 

  32. Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Processing 17(5):58–64. https://doi.org/10.1109/79.879339

    Article  Google Scholar 

  33. Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: Second international workshop on information hiding, IH98, Portland, Oregon, U.S.A., Proceedings, LNCS 1525. Springer, pp 219–239. https://doi.org/10.1007/3-540-49380-8_16

  34. Provos N (2001) Defending against statistical steganalysis. In: Tenth USENIX security symposium, pp 325–335

  35. Rudolf L, Harald N Enclicopedia of mathematics and its applications: finite fields, vol 20, part 1. Cambridge University Press, ISBN-13: 978-0521065672

  36. Sajjad M, Khan M, Irfan M, Irfan R, Wook BS (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75:14867–14893. https://doi.org/10.1007/s11042-015-2671-9

    Article  Google Scholar 

  37. Singh S, Siddiqui TJ (2012) A security enhanced robust steganography algorithm for data hiding. Int J Comput Sci Issues 9(3, no. 1):131–139. ISSN (Online). 1694-0814

    Google Scholar 

  38. Socek D, Kalva H, Magliveras SS, Marques O, Culibrk D, Furht B (2007) New approaches to encryption and steganography for digital videos. Multimedia Systems 13(3):191–204. https://doi.org/10.1007/s00530-007-0083-z

    Article  Google Scholar 

  39. Song S, Zhangb J, Liaoa X, Dua J, Wena Q (2011) A novel secure communication protocol combining steganography and cryptography. In: Advanced in control engineering and information science. Elsevier, pp 2767–2772. https://doi.org/10.1016/j.proeng.2011.08.521

  40. Sreekantha DK, Kavya AM (2017) Agricultural crop monitoring using IOT - a study. In: 11th international conference on intelligent systems and control (ISCO), 2017, pp 134–139. https://doi.org/10.1109/ISCO.2017.7855968

  41. Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D (2017) Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J Netw Comput Appl 89:3–13. https://doi.org/10.1016/j.jnca.2016.10.011

    Article  Google Scholar 

  42. Wang ZH, Kieu TD, Chang CC, Li MC (2010) A novel information concealing method based on exploiting modification direction. J Inf Hiding Multimedia Signal Process 1(1):1–9. https://doi.org/10.1007/978-3-642-35473-1_14

    Google Scholar 

  43. Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensics Secur 9(5). https://doi.org/10.1109/TIFS.2014.2308633

  44. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626. https://doi.org/10.1016/S0167-8655(02)00402-6

    Article  MATH  Google Scholar 

  45. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proceedings, Vision, Image and Signal Processing 152(5):611–615. https://doi.org/10.1049/ip-vis:20059022

    Article  Google Scholar 

  46. Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285:1725–1735. https://doi.org/10.1016/j.optcom.2011.12.003

    Article  Google Scholar 

  47. Zhou J Introduction to symmetric polynomials and symmetric functions, http://faculty.math.tsinghua.edu.cn/jzhou/symmetricf.pdf

Download references

Acknowledgements

The authors would like to thank Mr. Uttiya Ghosh for his partial help in implementation of this project when he was the student of St. Thomas’ College of Engineering & Technology, Kolkata.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Goutam Paul.

Appendix A: StegExpose outputs on sample images

Appendix A: StegExpose outputs on sample images

Table 28

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee (Ganguly), N., Paul, G. & Saha, S.K. An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77, 18451–18481 (2018). https://doi.org/10.1007/s11042-018-5720-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5720-3

Keywords

Navigation