Skip to main content
Log in

Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In 2006 X. Zhang and S, Wang suggested efficient steganographic embedding by Exploiting Modification Direction (EMD) where each important secrecy bit is converted to (2n + 1) -ary notational system which produces by n pixel values where 1 pixel is increased or decreased. To date, many researchers have implemented EMD algorithms that are less secure and produce less embedding capacity and imperceptibility. So, to reduce these limitations a combination of audio-video crypto-steganography using the Digital Forensic Detection Array EMD (DFDAEMD) algorithm is used. It uses (3m2 + 4 m + 2) ary notation to embed three pixels at a time for enhancing the embedding capacity and security of secret data. The observed and verified software results confirm that the implemented security model provides better Authentication, Imperceptibility, Robustness, Embedding Capacity (EC), Embedding Rate (ER), and very good recovery of both secret and original data as compared to any existing EMD methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Arab F, Abdullah SM, Hashim SZ, Manaf AA, Zamani M (2016) A Robust Video Watermarking Technique for the Tamper Detection of Surveillance System. Springer J Multimedia Tools Appl. https://doi.org/10.1007/s11042-015-2800-5

  2. Chang CC, Wu HL (2014) A large payload information hiding scheme using two level exploiting modification direction. Tenth IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 512–515. https://doi.org/10.1109/IIH-MSP.2014.133

  3. Dalal M, Juneja M (2021) Steganography and Steganalysis (in digital forensics): a cybersecurity guide. Springer J Multimedia Tools Appl 80(4):5723–5771. https://doi.org/10.1007/s11042-020-09929-9

  4. Hajizadeh H, Ayatollahi A, Mirzakuchaki S (2013) A new high capacity and EMD-based image steganography scheme in spatial domain. In: IEEE International Conference on Electrical Engineering (ICEE), pp 1–6

  5. Hong W, Chen T-S (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inform Forensic Sec 7(1):176–184. https://doi.org/10.1007/s11042-020-09929-910.1109/TIFS.2011.2155062

  6. Kao WC, Wang CC (2013) Data Hiding Based on Generalized Exploiting Modification Direction Method. Imaging Sci J 61:484–490

    Article  Google Scholar 

  7. Kartik JV, Reddy BV (2013) Authentication of secret information in image steganography. Int J Latest Trends Eng Technol 3(1):97–104

    Google Scholar 

  8. Kasana G, Singh K, Bhatia SS, (2015) “ Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform”, J Inform Process Syst (JIPS) 1–14 https://doi.org/10.3745/JIPS.03.0042

  9. Kuo WC, Wuu LC, Kuo SH (2012) The high embedding steganography method based on general multi EMD. In: IEEE International Conference Information Security and Intelligence Control (ISIC), pp 286–289

  10. Kuo WC, Chang SY, Wang CC, Chang CC (2016) Secure Multi-Group Data Hiding Based on Gemd map. Springer J Multimedia Tools Appl. https://doi.org/10.1007/s11042-015-3165-5

  11. Lee CF, Weng CY, Chen KC (2017) An Efficient Reversible Data Hiding with Reduplicated Exploiting Modification Direction using Image Interpolation and Edge Detection. Springer J Multimedia Tools Appl 76:9993–10016

    Article  Google Scholar 

  12. Leng H-S, Tseng H-W (2019) Generalize the EMD scheme on an n-dimensional hypercube with maximum payload. Springer J Multimedia Tools Appl 78(2):18363–18377. https://doi.org/10.1007/s11042-019-7228-x

  13. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A New Payload Partition Strategy in Color Image Steganography. IEEE Trans Circ Syst Video Technol. https://doi.org/10.1109/TCSVT.2019.2896270

  14. Liao X, Li K, Zhu X, Liu KR (2020) Robust Detection of Image Operator Chain with Two-stream Convolutional Neural Network. IEEE J Select Topics Signal Process. https://doi.org/10.1109/JSTSP.2020.3002391

  15. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. IEEE Trans Depend Secure Comput. https://doi.org/10.1109/TDSC.2020.3004708

  16. Liu Y, Chang CC, Huang PC (2017) Extended Exploiting-Modification-Direction Data Hiding with High Capacity. IEEE ICVIP. https://doi.org/10.1145/3177404.3177452

  17. Liu Y, Yang C, Sun Q (2018) “Enhance embedding capacity of generalized exploiting modification directions in data hiding” IEEE access, Digital Object Identifier https://doi.org/10.1109/ACCESS.2017.2787803

  18. Moon SK, Raut RD (2015) Efficient Performance Analysis of Data Hiding Technique for Enhancement of Information Security, Robustness and Perceptibility. Indersci Int J Electron Sec Digit Forensics 7(4):305–329

    Google Scholar 

  19. Moon SK, Raut RD (2018) Innovative data security model using forensic audio-video steganography for improving hidden data security and robustness. Indersci Int J Inform Comput Sec 10(4):374–395

    Google Scholar 

  20. Mustafa RJ, Elleithy K, Abdelfattah E (2017) Video-steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications, and Technology Conference (LISAT), pp 1–6. https://doi.org/10.1109/LISAT.2017.8001965

  21. Niu X, Ma M, Tang R, Yin Z (2015) Image steganography via fully exploiting modification direction. Int J Sec Appl 9(5):243–254

  22. Sadek MM, Khalifa AS, Mostafa MG (2014) Video-steganography: a comprehensive review. Springer J Multimed Tools Appl 74(17):7063–7094. https://doi.org/10.1007/s11042-014-1952-z

  23. Saha S, Ghosal SK, Chakraborty A, Dhargupta S, Sarkar R, Mandal JK (2018) Improved exploiting modification direction-based steganography using a weightage. Array Electron Lett. https://doi.org/10.1049/el.2017.3336,2018

  24. Saha S, Chakraborty A, Chatterjee A, Dhargupta S, Ghosal SK, Sarkar R (2020) Extended exploiting modification direction based steganography using hashed-weightage array. Springer J Multimedia Tools Appl. https://doi.org/10.1007/s11042-020-08951-1

  25. Sairam TD, Boopathybagan K (2020) An improved high capacity data hiding scheme using pixel value adjustment and Modulus operation. Springer J Multimedia Tools Appl 79:17003–17013

    Article  Google Scholar 

  26. Shen S-y, Huang L-h, Yu S-s (2018) A Novel Adaptive Data Hiding Based on Improved EMD and Interpolation. Springer J Multimedia Tools Appl 77:12563–12579. https://doi.org/10.1007/s11042-017-4905-5

    Article  Google Scholar 

  27. Singh L, Singh AK, Singh PK (2018) Secure Data Hiding Techniques: A Survey. Springer J Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6407-5,2018

  28. Younus ZS, Hussain MK (2019) Image Steganography using Exploiting Modification Direction for Compressed Encrypted Data. J King Saud Univ Comput Inform Sci. https://doi.org/10.1016/j.jksuci.2019.04.008

  29. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10:781–783

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil K Moon.

Ethics declarations

Conflicts of interests

The authors declare that there is no conflict of interest and no fund received from any agency.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moon, S.K. Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured data. Multimed Tools Appl 82, 35091–35120 (2023). https://doi.org/10.1007/s11042-023-14500-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14500-3

Keywords

Navigation