Abstract
With the technological advancement, security of information has become a sensitive and alarming issue since it is highly susceptible to many dangerous threats and attacks. In this context, we propose a steganographic methodology which endows a number of conditional evaluations in order to facilitate encryption and masking of the data. The Extended Power Modulus Scrambling (PMS) technique provides an encryption mask to the cover. It ensures the generation of randomized swapping sequence based on the estimated conditions, thus intensifying the security level. A new Bit Mapping Insertion strategy is implemented next. This method implants the data bits within the encrypted cover medium (in this case, image). Furthermore, the reverse scrambling technique zips and covers up the private data. This procedure accredits high payload in conjunction with retaining the quality of the image. The evaluation is done against various benchmarking parameters, which establishes the imperceptibility theory corresponding to the generated output images.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mukherjee, S., Sanyal, G.: Enhanced position power first mapping (PPFM) based image steganography. Int. J. of Comput. Appl. 39, 59–68 (2017)
Al-khasaaweneh, M.: Image encryption method based on using least square error techniques at the decryption stage. Int. J. Inf. Comput. Secur. 4(4), 332–344 (2011)
Sahoo, A., Tiwari, R.: A novel approach for hiding secret data in program files. Int. J. Inf. Comput. Secur. 8(1), 1–10 (2016)
Mukherjee, S., Ash, S., Sanyal, G.: A novel image steganographic methodology by power modulus scrambling with logistic mapping. In: IEEE Region 10th Conference on TENCON (2015)
Gayathri, J., Subashini, S.: A survey on security and efficiency issues in chaotic image encryption. Int. J. Inf. Comput. Secur. 8(4), 347–381 (2016)
Singh, K.: A survey on image steganography techniques. Int. J. Comput. Appl. 97, 10–20 (2014)
Gurav, J., et al.: High secured image by LSB steganography technique using matlab. Int. J. Recent Innov. Trends. Comput. Commun. 3(4), 1836–1840 (2015)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5, 201–214 (2010)
Kumar, A., Sharma, R.: A secure image steganography based on RSA algorithm and hash-LSB technique. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 363–372 (2012)
Gutub, A., Al-Qahtani, A., Tabakh, A.: Triple-A: secure RGB image steganography based on randomization. In: IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco, pp. 400–403 (2009)
Sanchetti, A.: Pixel value differencing image steganography using secret key. Int. J. Innov. Technol. Exploring Eng. 2, 2278–3075 (2012)
Mandal, J.K., et al.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. 2(4) (2012)
Khan, M., et al.: A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet. Inf. Syst. 9(5), 1938–1962 (2015)
Safarpour, M., Charmi, M.: Capacity enlargement of the PVD steganography method using the GLM technique. CoRR abs/1601.00299 (2016)
Ahmad, T., et al.: A survey on digital image steganography. In: The 7th International Conference on Information Technology (2015)
Mukherjee, S., Sanyal, G.: A novel image steganographic technique using Position Power First Mapping. In: IEEE International Conference on Research in Computational Intelligence and Communication Networks, pp. 406–410 (2015)
Almohammad, A., Ghinea, G.: Stego-image quality and the reliability of PSNR. In: Image Processing Theory, Tools and Applications. IEEE (2010)
Subhedar, M., Mankar, V.: Current status and key issues in image steganography: a survey. J. Comput. Sci. Rev. 13, 95–113 (2014)
Reddy, V., Subramanyam, A., Reddy, P.: A novel technique for JPEG image steganography and its performance evaluation. IJAMC 5, 211–224 (2014)
Koo, H., Cho, N.: Skew estimation of natural images based on a salient line detector. J. Electr. Imaging 22, 013020 (2013)
Moon, S., Raut, R.: Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility. Int. J. Electr. Secur. Dig. Forensics 7(4), 305–329 (2015)
Dukkipati, A.: On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl. Math. Comput. 218(23), 11674–11687 (2012)
Duncan, K., Sarkar, S.: Relational entropy-based saliency detection in images and videos. In: 19th IEEE International Conference on Image Processing, pp. 1093–1096 (2012)
Mohapatra, S., et al.: Adaptive threshold selection for impulsive noise detection in images using coefficient of variance. Neural Comput. Appl. 21(2), 281–288 (2012)
Kasana, G., Singh, K., Bhatia, S.: Data hiding using lifting scheme and genetic algorithm. Int. J. Inf. Comput. Secur. 9(4), 271–287 (2017)
Mukherjee, S., Sanyal, G.: A chaos based image steganographic system. Multimed. Tools Appl. 77, 1–26 (2018)
Banerjee, I., et al.: Hiding and analysis data in image using extended PMM. In: International Conference on Computational Intelligence: Modeling Techniques and Applications, pp. 157–166 (2013)
Yang, C., et al.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)
Mahajan, M., Kaur, N.: Steganography in coloured images using wavelet domain-based saliency map. Int. J. Inf. Comput. Secur. 5(3), 224–235 (2013)
Ash, S., Mukherjee, S., Sanyal, G.: A DWT based steganographic method using prime first mapping. In: Advances in Computing and Communicational Engineering, pp. 471–476 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mukherjee, S., Sanyal, G. (2019). Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion. In: Fahrnberger, G., Gopinathan, S., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2019. Lecture Notes in Computer Science(), vol 11319. Springer, Cham. https://doi.org/10.1007/978-3-030-05366-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-05366-6_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05365-9
Online ISBN: 978-3-030-05366-6
eBook Packages: Computer ScienceComputer Science (R0)