Skip to main content

A Novel Steganography Scheme Using Logistic Map, BRISK Descriptor, and K-Means Clustering

  • Conference paper
  • First Online:
Image and Video Technology (PSIVT 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14403))

Included in the following conference series:

  • 72 Accesses

Abstract

This paper introduces a novel steganography method for embedding and extracting a secret message from an image file using three stages. In the first stage, Binary Robust Invariant Scalable Keypoints (BRISK) and Good Features to Track are utilized to identify keypoints in the image. In the second stage, the k-means clustering algorithm is applied to these identified keypoints. The keypoints derived from the good features to track algorithm serve as cluster centers while the keypoints from the BRISK algorithm are distributed around these centers. In the last stage, the logistic map algorithm is employed to add more randomness to the obtained keypoints. This is done by distributing the points using the random list property. The results obtained indicate that the proposed method surpasses comparable techniques in terms of PSNR (Peak Signal-to-Noise Ratio), SSIM (Structural Similarity Index), and BER (Bit Error Rate) values metrics. Thus, the proposed scheme offers a performance advantage over existing methodologies.

Contributing authors—K.B. Salah, M. Kherallah and M.S. Naceur.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Laimeche, L., Meraoumia, A., Bendjenna, H.: Enhancing LSB embedding schemes using chaotic maps systems. Neural Comput. Appl. 32, 16605–16623 (2020)

    Article  Google Scholar 

  2. Jayapandiyan, J.R., Kavitha, C., Sakthivel, K.: Enhanced least significant bit replacement algorithm in spatial domain of steganography using character sequence optimization. IEEE Access 8, 136537–136545 (2020)

    Article  Google Scholar 

  3. Leutenegger, S., Chli, M., Siegwart, R.Y.: BRISK: binary robust invariant scalable keypoints. In: 2011 International Conference on Computer Vision. IEEE (2011)

    Google Scholar 

  4. Mukherjee (Ganguly), N., Paul, G., Saha, S.K.: An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimedia Tools Appl. 77(14), 18451–18481 (2018). https://doi.org/10.1007/s11042-018-5720-3

    Article  Google Scholar 

  5. Ahmed, A., Ahmed, A.: A secure image steganography using LSB and double XOR operations. Int. J. Comput. Sci. Netw. Secur. 20(5), 139–144 (2020)

    Google Scholar 

  6. Prasad, S., Pal, A.K.: Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds.) Emerging Technologies in Data Mining and Information Security, pp. 203–214. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1501-5_17

    Chapter  Google Scholar 

  7. Hureib, E.S.B., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 20(12), 232–241 (2020)

    Google Scholar 

  8. Swain, G.: Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab. J. Sci. Eng. 44(4), 2995–3004 (2019)

    Article  Google Scholar 

  9. Pak, C., et al.: A novel color image LSB steganography using improved 1D chaotic map. Multimedia Tools Appl. 79(1), 1409–1425 (2020)

    Article  Google Scholar 

  10. Nazari, M., Mehrabian, M.: A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimedia Tools and Appl. 80(7), 10615–10655 (2021)

    Article  Google Scholar 

  11. Nevriyanto, A., et al.: Image steganography using combine of discrete wavelet transform and singular value decomposition for more robustness and higher peak signal noise ratio. In: 2018 International Conference on Electrical Engineering and Computer Science (ICECOS). IEEE (2018)

    Google Scholar 

  12. Yi, X., Yang, K., Zhao, X., Wang, Y., Yu, H.: AHCM: adaptive Huffman code mapping for audio steganography based on psychoacoustic model. IEEE Trans. Inf. Forensics Secur. 14(8), 2217–2231 (2019). https://doi.org/10.1109/TIFS.2019.2895200

    Article  Google Scholar 

  13. Bikku, T., Paturi, R.: Frequency domain steganography with reversible texture combination. Traitement du Signal 36(1), 109–117 (2019)

    Article  Google Scholar 

  14. Burie, J.-C., Ogier, J.-M., Loc, C.V.: A spatial domain steganography for grayscale documents using pattern recognition techniques. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 9, p. 100. IEEE (2017)

    Google Scholar 

  15. Soleymani, S.H., Taherinia, A.H.: High capacity image steganography on sparse message of scanned document image (SMSDI). Multimedia Tools Appl. 76, 20847–20867 (2017)

    Article  Google Scholar 

  16. Lin, I.-C., Lin, Y.-B., Wang, C.-M.: Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Interfaces 31(2), 458–464 (2009)

    Article  MathSciNet  Google Scholar 

  17. Fourati, J., Othmani, M., Ltifi, H.: A hybrid model based on bidirectional long-short term memory and support vector machine for rest tremor classification. SIViP 16, 2175–2182 (2022). https://doi.org/10.1007/s11760-022-02180-9

    Article  Google Scholar 

  18. Ben Salah, K., Othmani, M., Kherallah, M.: Long short-term memory based photoplethysmography biometric authentication. In: Badica, C., Treur, J., Benslimane, D., Hnatkowska, B., Krotkiewicz, M. (eds.) ICCCI 2022. CCIS, vol. 1653, pp. 554–563. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-16210-7_45

    Chapter  Google Scholar 

  19. Ben Salah, K., Othmani, M., Kherallah, M.: Contactless heart rate estimation from facial video using skin detection and multi-resolution analysis. In: WSCG (2021). http://dx.doi.org/10.24132/CSRN.2021.3002.31

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan Jameel Azooz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Azooz, H.J., Ben Salah, K., Kherallah, M., Naceur, M.S. (2024). A Novel Steganography Scheme Using Logistic Map, BRISK Descriptor, and K-Means Clustering. In: Yan, W.Q., Nguyen, M., Nand, P., Li, X. (eds) Image and Video Technology. PSIVT 2023. Lecture Notes in Computer Science, vol 14403. Springer, Singapore. https://doi.org/10.1007/978-981-97-0376-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0376-0_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0375-3

  • Online ISBN: 978-981-97-0376-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics