Skip to main content

Advertisement

Log in

A physical equation based image steganography with electro-magnetic embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is adjudged to be a boon in the field of global conveyance of sensitive information. In this paper, a novel approach is proffered where all the ensued methods are epitomized in the dimensions of physics. The cardinal aim is to promote data hiding in terms of the explicit arena of applicability concerning physics. The initial step proceeds with the application of Motion Scrambling procedure. This is done by customizing the Power Modulus Scrambling (PMS) method in such a way that it uses some of the illustrious conventions from physics to procreate unique focal values. These values, in turn administer the scrambling methodology. The Electro-magnetic insertion technique then exerts specific salient formulations that efficaciously aid and expedite the mechanism of infusing secret bits. All the principles from the physics domain are elected with discreet observation. The followed experimental results show moderate competence and adeptness of the proposed work in terms of distinct benchmarking metrics, both quantitative and qualitative.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ahmad T, Abdullah M (2009) A novel steganographic method for gray-level images. International Journal of Computer, Information, and Systems Science, and Engineering 3:1

  2. Almohammad A, Ghinea G (2010) Stego-image quality and the reliability of PSNR. Int Conf on Image Processing Theory, Tools and Applications. IEEE

  3. Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2018) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 1–40

  4. Atawneh S, Almomani A, Bazar H et al (2016) Secure and imperceptible digital image Steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

  5. Banerjee I, Bhattacharyya S, Sanyal G (2013) Hiding & analyzing data in image using extended PMM, international conference on computational intelligence: modeling techniques and applications (CIMTA). Procedia Technol (10):157–166

  6. Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76:16529–16562

    Article  Google Scholar 

  7. Bao l, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k,n)-secret image sharing. IEEE Trans Image Process 26:5618–5631

    Article  MathSciNet  MATH  Google Scholar 

  8. Bhattacharyya S, Sanyal G (2012) Study and analysis of quality of service in different image based steganography using pixel mapping method. International Journal of Applied Information Systems (UAIS)-ISSN: 2249-0868:42–57

  9. Chandramouli R, Kharrazi M, Memon N (2003) Image steganography and Steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM (eds) IWDW. Springer, pp 35–49

  10. Dukkipati A (2012) On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl Math Comput 218:11674–11687

    MathSciNet  MATH  Google Scholar 

  11. El-Alfy E, Al-Sadi A (2011) A comparative study of PVD-based schemes for data hiding in digital images. In: Siegel HJ, El-Kadi A (eds) AICCSA. IEEE Computer Society, pp 144–149

  12. Feng J, Zhang J, Zhu X et al (2017) A novel chaos optimization algorithm. Multimed Tools Appl 76:17405–17436

    Article  Google Scholar 

  13. Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. In: Astola J, Egiazarian KO (eds) Proc. SPIE 7532, image processing: algorithms and systems VIII

  14. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hersheys

    Book  Google Scholar 

  15. Hansen B (2015) The integrated mean squared error of series regression and a Rosenthal Hilbert-space inequality. Econ Theory 31:337–361

    Article  MathSciNet  MATH  Google Scholar 

  16. He J, Lan W, Tang S (2017) A secure image sharing scheme with high quality stego-images based on steganography. Multimed Tools Appl 76:7677–7698

    Article  Google Scholar 

  17. Hiary H, Sabri KH, Mohammed M (2016) A hybrid steganography system based on LSB matching and replacement. Int J Adv Comput Sci Appl 7(9):374–380

    Google Scholar 

  18. Huang P, Chang KC, Chang CP, Tu TM (2008) A novel image steganography method using tri-way pixel value differencing. J Multimed 3:37–44

    Article  Google Scholar 

  19. Jain R, Kumar N (2012) Efficient data hiding scheme using lossless data compression and image steganography. Int J Eng Sci Technol 4(8):3908–3915

    Google Scholar 

  20. Kanan H, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130

    Article  Google Scholar 

  21. Khalifa O, Harding SH, Hashim AHA (2008) Compression using wavelet transform. Signal Processing: An International Journal 2(5):17–26

    Google Scholar 

  22. Koo H, Cho N (2013) Skew estimation of natural images based on a salient line detector. J Electron Imaging 22(1):013020

  23. Li Q, Fang YM, Xu JT (2016) A novel spatial pooling strategy for image quality assessment. J Comput Sci Technol 31:225–234

    Article  Google Scholar 

  24. Li J, Yu C, Gupta BB et al (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561

  25. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214

    Article  Google Scholar 

  26. Luo W, Huang F, Huang J (2010) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools App 52(2-3):407–430

  27. Muhammad K, Ahmad J, Rho S, Baik S (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76:18985–19004

    Article  Google Scholar 

  28. Mukherjee S, Sanyal G (2015) A novel image steganographic technique using position power first mapping (PPFM). IEEE international conference on research in computational intelligence and communication networks (ICRCICN), pp 406–410

  29. Mukherjee S, Sanyal G (2017) Enhanced position power first mapping (PPFM) based image steganography. Int J Comput Appl 39:59–68. Taylor and Francis

    Google Scholar 

  30. Mukherjee S, Sanyal G (2018) A chaos based image steganographic system. Multimed Tools Appl 77(21):27851–27876. Springer

    Article  Google Scholar 

  31. Mukherjee S, Ash S, Sanyal G (2015) A novel image steganographic methodology by power Modulus scrambling with logistic mapping. TENCON, IEEE region 10 conference

  32. Mukherjee S, Ash S, Sanyal G (2015) A novel differential Calculus based image steganography with crossover. International Journal of Computer, Control, Quantum and Information Engineering 9(4) World Academy of Science, Engineering and Technology (WASET)

  33. Mukherjee S, Ash S, Sanyal G (2015) A novel image Steganographic approach by pixel position Modulus method (PPMM). Computing for sustainable global development (INDIACom)

  34. Phad S, Bhosale S, Panhalkar R (2012) A novel security scheme for secret data using cryptography and steganography. International Journal of Computer Network and Information Security 2:36–42

    Google Scholar 

  35. Potdar V, Chang E (2004) Gray level modification steganography for secret communication. IEEE international conference on industrial informatics, Berlin, Germany, pp 355–368

  36. Safarpour M, Charmi M (2016) Capacity enlargement of the PVD steganography method using the GLM technique. CoRRabs 1601.00299

  37. Solemani S, Taherinia A (2017) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76:20847–20867

    Article  Google Scholar 

  38. Tomar G (2012) Effect of noise on image steganography based on LSB insertion and RSA encryption. IOSR Journal of Engineering 2(3):473–477

    Article  Google Scholar 

  39. Wang Z, Bovik A, Sheik H et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  40. Wang G, Yan W, Kankanhalli MS (2016) Content based authentication of visual cryptography. Multimed Tools Appl 76:9427–9441

    Article  Google Scholar 

  41. Wang I, Huang S, Lee K et al (2016) Data extraction via histogram and arithmetic mean queries: fundamental limits and algorithms. IEEE International Symposium on Information Theory, pp 1383–1390

  42. Xue W (2013) Study on digital image scrambling algorithm. JNW 8:1673–1679

    Google Scholar 

  43. Yang C, Weng C, Wang S et al (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3:488–497

    Article  Google Scholar 

  44. Yu C, Li J, Li X et al (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srilekha Mukherjee.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee, S., Sanyal, G. A physical equation based image steganography with electro-magnetic embedding. Multimed Tools Appl 78, 18571–18593 (2019). https://doi.org/10.1007/s11042-019-7239-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7239-7

Keywords