Skip to main content
Log in

A new digital steganography system based on hiding online signature within document image data in YUV color space

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the progression in computer technology and fast growth of interchange of data, Steganographyis becoming the best solution for providing greater security for sensitive document images which are uncontrolled across the internet. In this paper, we introduce a new signature steganography system for color document images in YUV color space based on the stego key and the Beta elliptic modeling. Firstly, the cover color document image is transformed into YUV from RGB space. Afterward, the embedding positions are identified based on the potential feature by using the Binary Robust Invariant Scalable Keypoints (BRISK) detector. In the next step, we decide the channel in which a Beta elliptic signature bits will be hidden on the basis of bitxor operation of Y channel’s LSB and the bits of stego key. Finally, the proposed system hides the Beta elliptic signature bits adaptively in U or V channel. It could be perceived from the results of experimentation that by the use of the proposed system, the embedded data is detectable even in the existence of common image processing distortion, as well the proposed steganography system in spatial domain has demonstrated to be robust and outperform the related works in term of the measurements image quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abdulrahman AK, Ozturk S (2019) A novel hybrid dct and dwt based robust watermarking algorithm for color images. Multimed Tools Applic, 1–23

  2. Abraham J, Paul V (2016) An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences

  3. Al-Haj A, Barouqa H (2017) Copyright protection of e-government document images using digital watermarking. In: 2017 3rd International conference on information management (iCIM). IEEE, pp 441–446

  4. Bourbakis N, Alexopoulos C (1992) Picture data encryp-tion using scan patterns. Pattern Recogn 25(6):567–581

    Article  Google Scholar 

  5. Burie JC, Ogier JM, Loc CV (2017) A spatial domain steganography for grayscale documents using pattern recognition techniques. In: 2017 14th IAPR international conference on document analysis and recognition (IC-DAR), vol 9. IEEE, pp 21–26

  6. Cu VL, Burie JC, Ogier JM, Liu CL Hiding security feature into text content for securing documents using generated font. In: 2019 International conference on document analysis and recognition (ICDAR) 2019 Sep 20. IEEE, pp 1214–1219

  7. Der-Chyuan L, Chia-Hung S (2004) A steganographic scheme for secure communications based on the chaos and euler theorem. IEEE Trans Multimed 6(3):501–509

    Article  Google Scholar 

  8. Dhieb T, Njah S, Boubaker H, Ouarda W, Ayed MB, Alimi AM (2018) An online writer identification system based on beta-elliptic model and fuzzy elementary perceptual codes. arXiv:1804.05661

  9. Dhieb T, Ouarda W, Boubaker H, Alimi AM (2016) Deep neural network for online writer identification using beta-elliptic model. In: 2016 International joint conference on neural networks (IJCNN), pp 1863–1870

  10. Dhieb T, Ouarda W, Boubaker H, Alimi AM (2016) Beta-elliptic model for writer identification from online arabic handwriting. Journal of Information Assurance & Security, 11(5)

  11. García-Soto R, Hernández-Anaya S, Nakano-Miyatake M, Rosales-Roldan L, Perez-Meana H (2013) Sender verification system for official documents based on watermarking technique. In: 2013 10th International conference on electrical engineering, computing science and automatic control (CCE). IEEE, pp 227–232

  12. Gonge SS, Ghatol AA (2014) Combined dwt-dct digital watermarking technique software used for cts of bank. In: 2014 International conference on issues and challenges in intelligent computing techniques (ICICT). IEEE, , pp 776–783

  13. Huffman DA (1952) A method for the construction of minimum-redundancy codes. Proc IRE 40(9):1098–1101

    Article  Google Scholar 

  14. Hussain M, Abdul-Wahab AW, Bin Idris Y, Anthony TH, Ki-Hyun J (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46–66

    Google Scholar 

  15. Jarusek R, Eva V, Martin K (2018) Robust steganographic method based on unconventional approach of neural networks. Appl Soft Comput 67:505–518

    Article  Google Scholar 

  16. Leutenegger S, Chli M, Siegwart RY (2011) Brisk: binary robust invariant scalable keypoints. In: 2011 International conference on computer vision, pp 2548–2555

  17. Leutenegger S, Chli M, Siegwart RY (2011) BRISK: binary robust invariant scalable keypoints. IEEE

  18. Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inform Forens Secur 10(9):1905–1917

    Article  Google Scholar 

  19. Li J, Yu C, Gupta B, Ren X (2018) Color image watermarking scheme based on quaternion hadamard transform and schur decomposition. Multimed Tools Applic 77(4):4545–4561

    Article  Google Scholar 

  20. Loc CV, Burie JC, Ogier JM (2018) Document images watermarking for security issue using fully convolutional networks. In: 2018 24th International conference on pattern recognition (ICPR) 2018 Aug 20. IEEE, pp 1091–1096

  21. Maatouk MN, Najoua EBA (2015) Adaptive watermarking algorithm of color images of ancient documents on YIQ-PCA color space. Computational intelligence in security for information systems conference. Springer, Cham

    Google Scholar 

  22. Mair E, Gregory DHr, Darius B, Michael S, Gerhard H (2010) Adaptive and generic corner detection based on the accelerated segment test. In: European conference on computer vision, pp 183–196. Springer, Berlin

  23. Malik Z, Siddiqi I (2014) Detection and recognition of trafficsigns from road scene images. In: 2014 12th International conference on frontiers of information technology, pp 330–335

  24. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Applic 76(6):8597–8626

    Article  Google Scholar 

  25. Muhammad K, Jan Z, Ahmad J, Khan Z (2015) An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks, arXiv:1510.00226

  26. Muhammad K, Mehmood I, Sajjad M, Ahmad J, Yoo SJ, Han D, Wook S (2015) Secure visual content la-belling for personalized image retrieval. In: The 11th international conference on multimedia information technology and applications (MITA 2015), pp 165–166

  27. Munib S, Khan A (2017) Robust image watermarking technique using triangular regions and zernike moments for quantization based embedding. Multimed Tools Applic 76(6):8695–8710

    Article  Google Scholar 

  28. Pandey MK, Parmar G, Gupta R, Sikander A (2018) Non-blind arnold scrambled hybrid image watermarking in ycbcr color space. Micro Syst Technol, 1–11

  29. Patvardhan C, Kumar P, Lakshmi CV (2018) Effective color image watermarking scheme using ycbcr color space and qr code. Multimed Tools Applic, 1–23

  30. Pham VQ, Miyaki T, Yamasaki T, Aizawa K (2007) Geometrically invariant object-based watermarking using sift feature. In: 2007 IEEE International conference on image processing, vol 5. IEEE, pp V–473

  31. Rosten E, Drummond T (2006) Machine learning for highspeed corner detection. In: Proceedings of the European conference on computer vision (ECCV)

  32. Roy SS, Abhishek B, Avik C (2019) Intelligent copyright protection for images. Chapman and Hall/CRC

  33. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forens Secur 11 (2):221–234

    Article  Google Scholar 

  34. Sejpal S, Shah N (2016) Comparative performance analysis of secured lwt-svd based color image watermarking technique in yuv, yiq and ycbcr color spaces. Int J Comput Applic 147(7):34–40

    Article  Google Scholar 

  35. Shiuh-Jeng W (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Mathem Comput 164(1):99–116

    Article  MathSciNet  Google Scholar 

  36. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106

    Article  Google Scholar 

  37. Yu L, Niu X, Sun S (2005) Print-and-scan model and the watermarking countermeasure. Image Vis Comput 23(9):807–814

    Article  Google Scholar 

Download references

Acknowledgments

The research leading to these results has received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anissa Zenati.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zenati, A., Ouarda, W. & Alimi, A.M. A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimed Tools Appl 80, 18653–18676 (2021). https://doi.org/10.1007/s11042-020-10376-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10376-9

Keywords

Navigation