Skip to content
2000
Volume 2, Issue 1
  • ISSN: 2665-9972
  • E-ISSN: 2665-9964

Abstract

Background

Recently, information hiding has become an important approach to securely storing and transmitting important information in digital media.

Objectives

This paper proposes a new approach to hide information in a color image with optimized security.

Methods

The approach performs the hiding in two phases. Firstly, the information that needs to be hidden in an image is represented by a sequence of binary bits, and the sequence is shuffled and encrypted with a set of three-dimensional chaotic systems. Secondly, the binary bits in the shuffled and encrypted sequence are hidden into the R, G, and B components of the pixels in the given color image with a dynamic programming approach.

Results

Experimental results show that the proposed approach can securely hide information in a color image without generating significant changes in the visual contents of a color image. The analysis also shows that the proposed approach is robust against potential attacks.

Conclusion

The proposed approach is thus practically useful for applications aimed at image-based information hiding.

Loading

Article metrics loading...

/content/journals/cccs/10.2174/2665997202666220329183806
2022-04-01
2025-07-05
Loading full text...

Full text loading...

References

  1. KadhimI.J. PremaratneP. VialP.J. HalloranB. Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research.Neurocomputing201933529932610.1016/j.neucom.2018.06.075
    [Google Scholar]
  2. ZhangX. SunZ. TangZ. YuC. WangX. High capacity data hiding based on interpolated image.Multimedia Tools Appl.20177679195921810.1007/s11042‑016‑3521‑0
    [Google Scholar]
  3. FabienA.P. AndersonR.J. KuhnM.G. Information hiding-a survey.Proceeding of the IEEE Special Issue on Protection of Multimedia Content199987710621078
    [Google Scholar]
  4. TrivediM.C. SharmaS. YadavV.K. Analysis of several image steganography techniques in spatial domain: A survey.In: Proceedings of the 2nd International Conference on Information and Communication Technology for Competitive Strategies (ICTCS)Udaipur, India20161710.1145/2905055.2905294
    [Google Scholar]
  5. MukherjeeN. PaulG. SahaS.K. An efficient multi-bit steganography algorithm in spatial domain with two-layer security.Multimedia Tools Appl.20187714184511848110.1007/s11042‑018‑5720‑3
    [Google Scholar]
  6. HussainM. WahabA.W.A. IdrisY.I.B. HoA.T.S. JungK.H. Image steganography in spatial domain: A survey.Signal Process. Image Commun.201865466610.1016/j.image.2018.03.012
    [Google Scholar]
  7. HuX. NiJ. ShiY.Q. Efficient JPEG steganography using domain transformation of embedding entropy.IEEE Signal Process. Lett.201825677377710.1109/LSP.2018.2818674
    [Google Scholar]
  8. ValandarM.Y. AyubiP. BaraniM.J. A new transform domain steganography based on modified logistic chaotic map for color images.J. Inf. Secur. Appl.20173414215110.1016/j.jisa.2017.04.004
    [Google Scholar]
  9. LuT. LiaoS. ChangC. The information hiding technology based on the similar sample blocks of grayscale image.Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingNew York Washington D.C., USA2010172010.1109/IIHMSP.2010.12
    [Google Scholar]
  10. FridrichJ. GoljanM. DuR. Detecting LSB steganography in color, and gray-scale images.IEEE Multimed.200184222810.1109/93.959097
    [Google Scholar]
  11. WuH.C. WuN.I. TsaiC.S. HwangM.S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods.IEE Proc. Vis. Image Signal Process.2005152561161510.1049/ip‑vis:20059022
    [Google Scholar]
  12. ChangC.C. TsengH.W. A steganographic method for digital images using side match.Pattern Recognit. Lett.200525121431143710.1016/j.patrec.2004.05.006
    [Google Scholar]
  13. WangC.M. WuN.I. TsaiC.S. HwangM.S. A high quality steganographic method with pixel-value differencing and modulus function.J. Syst. Softw.200881115015810.1016/j.jss.2007.01.049
    [Google Scholar]
  14. SongY. SongJ. QuJ. Optimal image based information hiding with one-dimensional chaotic systems and dynamic programming.Int. Arab J. Inf. Technol.2022191110.34028/iajit/19/1/1
    [Google Scholar]
  15. PalP. ChowdhuriP. JanaB. Weighted matrix based reversible watermarking scheme using color image.Multimedia Tools Appl.20187718230732309810.1007/s11042‑017‑5568‑y
    [Google Scholar]
  16. MalikA. SikkaG. VermaH.K. A reversible data hiding scheme for interpolated images based on pixel intensity range.Multimedia Tools Appl.20207925-261710.1007/s11042‑020‑08691‑2
    [Google Scholar]
  17. ChowdhuriP. JanaB. Hiding data in dual color images reversibly via weighted matrix.J. Inf. Secur. Appl.20205010242010243410.1016/j.jisa.2019.102420
    [Google Scholar]
  18. ZhouZ.L. CaoY. SunX.M. Coverless information hiding based on bag-of-words model of image.J. Appl. Sci. Electron. Inf. Eng.2016345527536
    [Google Scholar]
  19. ChenY. YuC. ZhangX. TangZ. HeN. Reversible information hiding method in encrypted image based on surface interpolation.J. Appl. Sci.2018362220236
    [Google Scholar]
  20. ZhangT. LiuY. RenS. ZhangD. Differential histogram shift lossless information hiding algorithm based on LBP face texture feature.Jisuanji Yingyong Yanjiu201937617741778
    [Google Scholar]
  21. RenS. WangM. ShahzadK. GaoZ. XuJ. Multi-Carrier information hiding algorithm based on angle structure descriptor.IEEE Access2020812256512257810.1109/ACCESS.2020.3006560
    [Google Scholar]
  22. SinghL.D. SinghK.M. Visually meaningful multi-image encryption scheme.Arab. J. Sci. Eng.201843127397740710.1007/s13369‑018‑3104‑7
    [Google Scholar]
  23. ZhaoZ. GuanQ. ZhaoX. YuH. LiuC. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain.Multimedia Tools Appl.20177711140931411310.1007/s11042‑017‑5016‑z
    [Google Scholar]
  24. ChenG. ShenH. WuY. ChenJ. Research on multi-carrier image separation and steganography algorithm.Comput. Eng2012384116118
    [Google Scholar]
  25. ZhangX. QianZ. LiS. Prospects of information hiding research.J. Appl. Sci.2016345475489
    [Google Scholar]
  26. DenemarkT. FridrichJ. Steganography with multiple JPEG images of the same scene.IEEE Trans. Inf. Forensics Security201712102308231910.1109/TIFS.2017.2705625
    [Google Scholar]
  27. ChenL. LiuH.W. DengX.H. Reversible watermarking algorithm for digital image based on integer wavelet transform.Comput. Appl. Softw.2016334286291
    [Google Scholar]
  28. MitekinV.A. FedoseevV.A. New secure QIM-based information hiding algorithms.Comput. Opt.201842111812710.18287/2412‑6179‑2018‑42‑1‑118‑127
    [Google Scholar]
  29. AbdulJ.M. KhalafT.K. KarthikeyanR. AhmedA. TasawarH. Viet–ThanhP. A new three-dimensional chaotic flow with one stable equilibrium: Dynamical properties and complexity analysis.Open Phys.201816126026510.1515/phys‑2018‑0037
    [Google Scholar]
  30. MartinD. FowlkesC. TalD. MalikJ. A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics.Proceedings Eighth IEEE International Conference on Computer Vision. (ICCV)2001241642310.1109/ICCV.2001.937655
    [Google Scholar]
/content/journals/cccs/10.2174/2665997202666220329183806
Loading
/content/journals/cccs/10.2174/2665997202666220329183806
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test