Abstract
Due to the progression in computer technology and fast growth of interchange of data, Steganographyis becoming the best solution for providing greater security for sensitive document images which are uncontrolled across the internet. In this paper, we introduce a new signature steganography system for color document images in YUV color space based on the stego key and the Beta elliptic modeling. Firstly, the cover color document image is transformed into YUV from RGB space. Afterward, the embedding positions are identified based on the potential feature by using the Binary Robust Invariant Scalable Keypoints (BRISK) detector. In the next step, we decide the channel in which a Beta elliptic signature bits will be hidden on the basis of bitxor operation of Y channel’s LSB and the bits of stego key. Finally, the proposed system hides the Beta elliptic signature bits adaptively in U or V channel. It could be perceived from the results of experimentation that by the use of the proposed system, the embedded data is detectable even in the existence of common image processing distortion, as well the proposed steganography system in spatial domain has demonstrated to be robust and outperform the related works in term of the measurements image quality.
Similar content being viewed by others
References
Abdulrahman AK, Ozturk S (2019) A novel hybrid dct and dwt based robust watermarking algorithm for color images. Multimed Tools Applic, 1–23
Abraham J, Paul V (2016) An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences
Al-Haj A, Barouqa H (2017) Copyright protection of e-government document images using digital watermarking. In: 2017 3rd International conference on information management (iCIM). IEEE, pp 441–446
Bourbakis N, Alexopoulos C (1992) Picture data encryp-tion using scan patterns. Pattern Recogn 25(6):567–581
Burie JC, Ogier JM, Loc CV (2017) A spatial domain steganography for grayscale documents using pattern recognition techniques. In: 2017 14th IAPR international conference on document analysis and recognition (IC-DAR), vol 9. IEEE, pp 21–26
Cu VL, Burie JC, Ogier JM, Liu CL Hiding security feature into text content for securing documents using generated font. In: 2019 International conference on document analysis and recognition (ICDAR) 2019 Sep 20. IEEE, pp 1214–1219
Der-Chyuan L, Chia-Hung S (2004) A steganographic scheme for secure communications based on the chaos and euler theorem. IEEE Trans Multimed 6(3):501–509
Dhieb T, Njah S, Boubaker H, Ouarda W, Ayed MB, Alimi AM (2018) An online writer identification system based on beta-elliptic model and fuzzy elementary perceptual codes. arXiv:1804.05661
Dhieb T, Ouarda W, Boubaker H, Alimi AM (2016) Deep neural network for online writer identification using beta-elliptic model. In: 2016 International joint conference on neural networks (IJCNN), pp 1863–1870
Dhieb T, Ouarda W, Boubaker H, Alimi AM (2016) Beta-elliptic model for writer identification from online arabic handwriting. Journal of Information Assurance & Security, 11(5)
García-Soto R, Hernández-Anaya S, Nakano-Miyatake M, Rosales-Roldan L, Perez-Meana H (2013) Sender verification system for official documents based on watermarking technique. In: 2013 10th International conference on electrical engineering, computing science and automatic control (CCE). IEEE, pp 227–232
Gonge SS, Ghatol AA (2014) Combined dwt-dct digital watermarking technique software used for cts of bank. In: 2014 International conference on issues and challenges in intelligent computing techniques (ICICT). IEEE, , pp 776–783
Huffman DA (1952) A method for the construction of minimum-redundancy codes. Proc IRE 40(9):1098–1101
Hussain M, Abdul-Wahab AW, Bin Idris Y, Anthony TH, Ki-Hyun J (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46–66
Jarusek R, Eva V, Martin K (2018) Robust steganographic method based on unconventional approach of neural networks. Appl Soft Comput 67:505–518
Leutenegger S, Chli M, Siegwart RY (2011) Brisk: binary robust invariant scalable keypoints. In: 2011 International conference on computer vision, pp 2548–2555
Leutenegger S, Chli M, Siegwart RY (2011) BRISK: binary robust invariant scalable keypoints. IEEE
Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inform Forens Secur 10(9):1905–1917
Li J, Yu C, Gupta B, Ren X (2018) Color image watermarking scheme based on quaternion hadamard transform and schur decomposition. Multimed Tools Applic 77(4):4545–4561
Loc CV, Burie JC, Ogier JM (2018) Document images watermarking for security issue using fully convolutional networks. In: 2018 24th International conference on pattern recognition (ICPR) 2018 Aug 20. IEEE, pp 1091–1096
Maatouk MN, Najoua EBA (2015) Adaptive watermarking algorithm of color images of ancient documents on YIQ-PCA color space. Computational intelligence in security for information systems conference. Springer, Cham
Mair E, Gregory DHr, Darius B, Michael S, Gerhard H (2010) Adaptive and generic corner detection based on the accelerated segment test. In: European conference on computer vision, pp 183–196. Springer, Berlin
Malik Z, Siddiqi I (2014) Detection and recognition of trafficsigns from road scene images. In: 2014 12th International conference on frontiers of information technology, pp 330–335
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Applic 76(6):8597–8626
Muhammad K, Jan Z, Ahmad J, Khan Z (2015) An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks, arXiv:1510.00226
Muhammad K, Mehmood I, Sajjad M, Ahmad J, Yoo SJ, Han D, Wook S (2015) Secure visual content la-belling for personalized image retrieval. In: The 11th international conference on multimedia information technology and applications (MITA 2015), pp 165–166
Munib S, Khan A (2017) Robust image watermarking technique using triangular regions and zernike moments for quantization based embedding. Multimed Tools Applic 76(6):8695–8710
Pandey MK, Parmar G, Gupta R, Sikander A (2018) Non-blind arnold scrambled hybrid image watermarking in ycbcr color space. Micro Syst Technol, 1–11
Patvardhan C, Kumar P, Lakshmi CV (2018) Effective color image watermarking scheme using ycbcr color space and qr code. Multimed Tools Applic, 1–23
Pham VQ, Miyaki T, Yamasaki T, Aizawa K (2007) Geometrically invariant object-based watermarking using sift feature. In: 2007 IEEE International conference on image processing, vol 5. IEEE, pp V–473
Rosten E, Drummond T (2006) Machine learning for highspeed corner detection. In: Proceedings of the European conference on computer vision (ECCV)
Roy SS, Abhishek B, Avik C (2019) Intelligent copyright protection for images. Chapman and Hall/CRC
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forens Secur 11 (2):221–234
Sejpal S, Shah N (2016) Comparative performance analysis of secured lwt-svd based color image watermarking technique in yuv, yiq and ycbcr color spaces. Int J Comput Applic 147(7):34–40
Shiuh-Jeng W (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Mathem Comput 164(1):99–116
Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106
Yu L, Niu X, Sun S (2005) Print-and-scan model and the watermarking countermeasure. Image Vis Comput 23(9):807–814
Acknowledgments
The research leading to these results has received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zenati, A., Ouarda, W. & Alimi, A.M. A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimed Tools Appl 80, 18653–18676 (2021). https://doi.org/10.1007/s11042-020-10376-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10376-9