Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

FFT-ETM based distortion less and high payload image steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper is presenting a novel high capacity based imperceptible and robust image steganography technique for obscured communication. A considerable literature studied on this domain reveals distortion that drastically affects image quality. These techniques obscure covert data in most significant bits or least significant bits of host image via easy or unsystematic replacement. Such schemes are vulnerable to malevolent attacks like sample pair method, chi-square test, and quality of host image especially badly affected by MSB replacement. Furthermore, such schemes are lacking in carrying maximum covert information as the number of host image pixels and covert image pixels has the ratio 8:1. In our proposed scheme robust and imperceptibility feature is injected using insignificant pixel value divergence of host and a high capacity covert image. We have proposed frequency entropy method that compares frequencies of covert image and host image in FFT (Fast Fourier Transform) domain. The eminent rate of frequency ETM (Entropy Threshold Match) leads to good image quality and information carrying capability. Moreover, our proposed technique also encrypts the secret image in frequency domain with multi flipped permutated random key vector that provides robustness. Therefore, experiments exhibit that this scheme has improved signal to noise ratio and BPP (bits per pixel) in contrast to existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdul W, Ali Z, Ghouzali S, Alfawaz B, Muhammad G, Hossain MS (2017) Biometric security through visual encryption for fog edge computing. IEEE Access 5:5531–5538

    Article  Google Scholar 

  2. Al-Haj A, Abandah G, Hussein N (2015) Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365–373

    Article  Google Scholar 

  3. Andalibi M, Chandler MD (2015) Digital Image Watermarking via Adaptive Logo Texturization. IEEE Trans Image Process 24(04):5060–5073

    Article  MATH  Google Scholar 

  4. Bhowmik D, Oakes M, Abhayaratne C (2016) Visual Attention-Based Image Watermarking. IEEE Access 4(09):8002–8018

    Article  Google Scholar 

  5. Bose A, Maity SP (2017) Spread spectrum watermark detection on degraded compressed sensing. IEEE Sensors Letters 1(5):1–4

    Article  Google Scholar 

  6. Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973–7987

    Article  Google Scholar 

  7. Chang CS, Shen JJ (2017) Features classification Forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921–3935

    Article  MathSciNet  MATH  Google Scholar 

  8. El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimed Tools Appl 76(24):26463–26501

    Article  Google Scholar 

  9. Gao G, Cui Z, Zhou C (2018) Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Processing Letters 25(7):1099–1103

    Article  Google Scholar 

  10. Guo Y, Cao X, Zhang W, Wang R (2018) Fake Colorized Image Detection. arXiv preprint arXiv:1801.02768

  11. Huang Y, Kuo J, Hsieh W (2015) Capacity Controllable Location Map Free Reversible Watermarking. Chin J Electron 24(3):519–523

    Article  Google Scholar 

  12. Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano M, Perez-Meana H (2018) Improved imperceptible visible watermarking algorithm for auxiliary information delivery. IET Biometrics 7(4):305–313

    Article  Google Scholar 

  13. Khan A (2014) Joint Ownership Verification for Digital Text. Advances in Computer Science and its Applications 3(4):525–531

    Google Scholar 

  14. Khan A (2015) Comparative Analysis of Watermarking Techniques. Forensic Sci Int 27(6):6091–6096

    Google Scholar 

  15. Khan A (2015) Robust Textual Steganography. Journal of Science 4(4):426–434

    Google Scholar 

  16. Khan A, Sarfaraz A (2017) Vetting the Security of Mobile Applications. Forensic Sci Int 29(2):361–365

    Google Scholar 

  17. Khan A, Sarfaraz A (2018) Novel High-Capacity Robust and Imperceptible Image Steganography Scheme using Multi Flipped Permutations and Frequency Entropy Matching Method. Soft Comput:1–12

  18. Khan A, Sarfaraz A (2018) Practical Guidelines for Securing Wireless Local Area Networks (WLANs). International Journal of Security and Its Applications 12(3):19–28

    Article  Google Scholar 

  19. Khan A, Sohaib M, Amjad FM (2016) High-Capacity Multi-layer Framework for Highly Robust Textual Steganography. Forensic Sci Int 28(5):4451–4457

    Google Scholar 

  20. Lin ZX, Peng F, Long M (2018) A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Transactions on Information Forensics and Security 13(9):2372–2382

    Article  Google Scholar 

  21. Liu XL, Lin CC, Yuan SM (2018) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047–1055

    Article  Google Scholar 

  22. Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Process 11(10):815–821

    Article  Google Scholar 

  23. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876–19897

    Article  Google Scholar 

  24. Ma Z (2017) Digital rights management: Model, technology and application. China Communications 14(6):156–167

    Article  Google Scholar 

  25. Martínez S, Gérard S, Cabot J (2018) On Watermarking for Collaborative Model-Driven Engineering. IEEE Access 6:29715–29728

    Article  Google Scholar 

  26. Mehra I, Fatima A, Nishchal NK (2017) Gyrator wavelet transform. IET Image Process 12(3):432–437

    Article  Google Scholar 

  27. Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133–13144

    Article  Google Scholar 

  28. Nazir LA, Nasir HN, Shabir PA, Jong LW, Javaid SA, Bhat MG (2015) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6(16):19876–19897

    Google Scholar 

  29. Nie X, Li X, Chai Y, Cui C, Xi X, Yin Y (2018) Robust image fingerprinting based on feature point relationship mining. IEEE Transactions on Information Forensics and Security 13(6):1509–1523

    Article  Google Scholar 

  30. Noor R, Khan A, Sarfaraz A (2018) High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device. Wirel Pers Commun:1–17

  31. Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema AM (2019) Highly Robust Hybrid Image Watermarking approach using Tchebichef Transform with Secured PCA and CAT Encryption. Soft Comput:1–9

  32. Preda OR, Vizireanu ND (2015) Watermarking-based image authentication robust to JPEG compression. Electron Lett 51(23):1873–1875

    Article  Google Scholar 

  33. Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Computing 5(2):48–57

    Article  Google Scholar 

  34. Roldan RL, Hernandez CM, Chao J, Miyatake NM, Hector MP (2016) Watermarking-based Color Image Authentication with Detection and Recovery Capability. IEEE Lat Am Trans 14(2):1050–1057

    Article  Google Scholar 

  35. Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510

    Article  Google Scholar 

  36. Sangita CZ, Venkatachalam P, Krishna BM (2015) Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 8(23):5388–5394

    Google Scholar 

  37. Sarfaraz A, Khan A (2018) Feature Selection based Correlation Attack on HTTPS Secure Searching. Wirel Pers Commun 103(4):2995–3008

    Article  Google Scholar 

  38. Sarreshtedari S, Akhaee MA, Abbasfar A (2015) A watermarking method for digital speech self-recovery. IEEE/ACM Transactions on Audio, Speech and Language Processing 23(11):1917–1925

    Google Scholar 

  39. Shahdoosti HR, Salehi M (2017) Transform-based watermarking algorithm maintaining perceptual transparency. IET Image Process 12(5):751–759

    Article  Google Scholar 

  40. Siddiqa A, Khan A (2015) High capacity reversible image watermarking using error expansion and context-dependent embedding. Electron Lett 51(25):985–987

    Article  Google Scholar 

  41. Unno H, Uehira K (2017) Display technique for embedding information in real object images using temporally and spatially luminance-modulated light. IEEE Trans Ind Appl 53(6):5966–5971

    Article  Google Scholar 

  42. Unno H, Yamkum R, Bunporn C, Uehira K (2017) A new displaying technology for information hiding using temporally brightness modulated pattern. IEEE Trans Ind Appl 53(1):596–601

    Article  Google Scholar 

  43. Wang Y, Liu J, Yang Y, Ma D, Liu R (2017) 3D model watermarking algorithm robust to geometric attacks. IET Image Process 11(10):822–832

    Article  Google Scholar 

  44. Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063–2077

    Article  MathSciNet  MATH  Google Scholar 

  45. Wei Q, Yin Z, Wang Z, Zhang X (2017) Distortion function based on residual blocks for JPEG steganography. Multimed Tools Appl:1–14

  46. Wei Y, Zhang W, Li W, Yu N, Sun X (2017) Which gray level should be given the smallest cost for adaptive steganography? Multimed Tools Appl:1–14

  47. Wu HZ, Shi YQ, Zhou LN (2017) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620–1631

    Article  Google Scholar 

  48. Zhao J, Zhang N, Jia J, Wang H (2015) Digital watermarking algorithm based on scale-invariant feature regions in non-subsampled contourlet transform domain. J Syst Eng Electron 26(6):1309–1314

    Article  Google Scholar 

  49. Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust Histogram Shape-Based Method for Image Watermarking. IEEE Transactions on Circuits and Systems for Video Technology 25(5):717–729

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Khan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, A., Sarfaraz, A. FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78, 25999–26022 (2019). https://doi.org/10.1007/s11042-019-7664-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7664-7

Keywords