Abstract
This paper is presenting a novel high capacity based imperceptible and robust image steganography technique for obscured communication. A considerable literature studied on this domain reveals distortion that drastically affects image quality. These techniques obscure covert data in most significant bits or least significant bits of host image via easy or unsystematic replacement. Such schemes are vulnerable to malevolent attacks like sample pair method, chi-square test, and quality of host image especially badly affected by MSB replacement. Furthermore, such schemes are lacking in carrying maximum covert information as the number of host image pixels and covert image pixels has the ratio 8:1. In our proposed scheme robust and imperceptibility feature is injected using insignificant pixel value divergence of host and a high capacity covert image. We have proposed frequency entropy method that compares frequencies of covert image and host image in FFT (Fast Fourier Transform) domain. The eminent rate of frequency ETM (Entropy Threshold Match) leads to good image quality and information carrying capability. Moreover, our proposed technique also encrypts the secret image in frequency domain with multi flipped permutated random key vector that provides robustness. Therefore, experiments exhibit that this scheme has improved signal to noise ratio and BPP (bits per pixel) in contrast to existing schemes.
Similar content being viewed by others
References
Abdul W, Ali Z, Ghouzali S, Alfawaz B, Muhammad G, Hossain MS (2017) Biometric security through visual encryption for fog edge computing. IEEE Access 5:5531–5538
Al-Haj A, Abandah G, Hussein N (2015) Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365–373
Andalibi M, Chandler MD (2015) Digital Image Watermarking via Adaptive Logo Texturization. IEEE Trans Image Process 24(04):5060–5073
Bhowmik D, Oakes M, Abhayaratne C (2016) Visual Attention-Based Image Watermarking. IEEE Access 4(09):8002–8018
Bose A, Maity SP (2017) Spread spectrum watermark detection on degraded compressed sensing. IEEE Sensors Letters 1(5):1–4
Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973–7987
Chang CS, Shen JJ (2017) Features classification Forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921–3935
El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimed Tools Appl 76(24):26463–26501
Gao G, Cui Z, Zhou C (2018) Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Processing Letters 25(7):1099–1103
Guo Y, Cao X, Zhang W, Wang R (2018) Fake Colorized Image Detection. arXiv preprint arXiv:1801.02768
Huang Y, Kuo J, Hsieh W (2015) Capacity Controllable Location Map Free Reversible Watermarking. Chin J Electron 24(3):519–523
Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano M, Perez-Meana H (2018) Improved imperceptible visible watermarking algorithm for auxiliary information delivery. IET Biometrics 7(4):305–313
Khan A (2014) Joint Ownership Verification for Digital Text. Advances in Computer Science and its Applications 3(4):525–531
Khan A (2015) Comparative Analysis of Watermarking Techniques. Forensic Sci Int 27(6):6091–6096
Khan A (2015) Robust Textual Steganography. Journal of Science 4(4):426–434
Khan A, Sarfaraz A (2017) Vetting the Security of Mobile Applications. Forensic Sci Int 29(2):361–365
Khan A, Sarfaraz A (2018) Novel High-Capacity Robust and Imperceptible Image Steganography Scheme using Multi Flipped Permutations and Frequency Entropy Matching Method. Soft Comput:1–12
Khan A, Sarfaraz A (2018) Practical Guidelines for Securing Wireless Local Area Networks (WLANs). International Journal of Security and Its Applications 12(3):19–28
Khan A, Sohaib M, Amjad FM (2016) High-Capacity Multi-layer Framework for Highly Robust Textual Steganography. Forensic Sci Int 28(5):4451–4457
Lin ZX, Peng F, Long M (2018) A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Transactions on Information Forensics and Security 13(9):2372–2382
Liu XL, Lin CC, Yuan SM (2018) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047–1055
Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Process 11(10):815–821
Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876–19897
Ma Z (2017) Digital rights management: Model, technology and application. China Communications 14(6):156–167
Martínez S, Gérard S, Cabot J (2018) On Watermarking for Collaborative Model-Driven Engineering. IEEE Access 6:29715–29728
Mehra I, Fatima A, Nishchal NK (2017) Gyrator wavelet transform. IET Image Process 12(3):432–437
Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133–13144
Nazir LA, Nasir HN, Shabir PA, Jong LW, Javaid SA, Bhat MG (2015) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6(16):19876–19897
Nie X, Li X, Chai Y, Cui C, Xi X, Yin Y (2018) Robust image fingerprinting based on feature point relationship mining. IEEE Transactions on Information Forensics and Security 13(6):1509–1523
Noor R, Khan A, Sarfaraz A (2018) High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device. Wirel Pers Commun:1–17
Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema AM (2019) Highly Robust Hybrid Image Watermarking approach using Tchebichef Transform with Secured PCA and CAT Encryption. Soft Comput:1–9
Preda OR, Vizireanu ND (2015) Watermarking-based image authentication robust to JPEG compression. Electron Lett 51(23):1873–1875
Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Computing 5(2):48–57
Roldan RL, Hernandez CM, Chao J, Miyatake NM, Hector MP (2016) Watermarking-based Color Image Authentication with Detection and Recovery Capability. IEEE Lat Am Trans 14(2):1050–1057
Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510
Sangita CZ, Venkatachalam P, Krishna BM (2015) Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 8(23):5388–5394
Sarfaraz A, Khan A (2018) Feature Selection based Correlation Attack on HTTPS Secure Searching. Wirel Pers Commun 103(4):2995–3008
Sarreshtedari S, Akhaee MA, Abbasfar A (2015) A watermarking method for digital speech self-recovery. IEEE/ACM Transactions on Audio, Speech and Language Processing 23(11):1917–1925
Shahdoosti HR, Salehi M (2017) Transform-based watermarking algorithm maintaining perceptual transparency. IET Image Process 12(5):751–759
Siddiqa A, Khan A (2015) High capacity reversible image watermarking using error expansion and context-dependent embedding. Electron Lett 51(25):985–987
Unno H, Uehira K (2017) Display technique for embedding information in real object images using temporally and spatially luminance-modulated light. IEEE Trans Ind Appl 53(6):5966–5971
Unno H, Yamkum R, Bunporn C, Uehira K (2017) A new displaying technology for information hiding using temporally brightness modulated pattern. IEEE Trans Ind Appl 53(1):596–601
Wang Y, Liu J, Yang Y, Ma D, Liu R (2017) 3D model watermarking algorithm robust to geometric attacks. IET Image Process 11(10):822–832
Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063–2077
Wei Q, Yin Z, Wang Z, Zhang X (2017) Distortion function based on residual blocks for JPEG steganography. Multimed Tools Appl:1–14
Wei Y, Zhang W, Li W, Yu N, Sun X (2017) Which gray level should be given the smallest cost for adaptive steganography? Multimed Tools Appl:1–14
Wu HZ, Shi YQ, Zhou LN (2017) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620–1631
Zhao J, Zhang N, Jia J, Wang H (2015) Digital watermarking algorithm based on scale-invariant feature regions in non-subsampled contourlet transform domain. J Syst Eng Electron 26(6):1309–1314
Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust Histogram Shape-Based Method for Image Watermarking. IEEE Transactions on Circuits and Systems for Video Technology 25(5):717–729
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, A., Sarfaraz, A. FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78, 25999–26022 (2019). https://doi.org/10.1007/s11042-019-7664-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7664-7