Abstract
Data security is one of the critical challenges for digital information. The existing steganography algorithms hide confidential data in the cover media to preserve the presence of hidden data. One type of steganography algorithm is a puzzle-based algorithm such as sudoku, magic cube, and basic nonogram puzzle. These puzzles depend on an auxiliary reference matrix for communication with the receiver. However, using a reference matrix is prone to a statistical histogram attack because image data hiding pixels are fixed. The challenging task here is to design a secured secret data technique that hides the secret data bits in the cover using a suitable puzzle without communicating the reference matrix with the receiver. This paper proposes a new Binary Nonogram Puzzle (BNP) technique. The BNP is based on two elements: searching the BNP indexes based on LSB of the cover pixel and hiding the secret data in random pixel based on the index information. The first row and column for each block are considered an index for the remaining block elements used for data hiding. We also identify the position to hide the secret data that calculates vertical and horizontal summation to indicate a suitable index with the specified rule. The effectiveness of the BNP was tested on the standard dataset images (USC-SIPI image database) and evaluated using Peak signal-to-noise ratio (PSNR) and Mean Square Error (MSE). The results showed that BNP achieves high PSNR and low MSE compared to the existing puzzles (Magic Cube and Basic Nonogram puzzle) and guarantees a better stego image quality.




















Similar content being viewed by others
Data availability
All data regarding this work are available in this manuscript.
References
Alhaddad MJ, Alkinani MH, Atoum MS, Alarood AA (2020) Evolutionary detection accuracy of secret data in audio steganography for securing 5G-enabled internet of things. Symmetry (Basel) 12:1–18. https://doi.org/10.3390/sym12122071
Alyousuf FQA, Din R, Qasim AJ (2020) Analysis review on spatial and transform domain technique in digital steganography. Bull Electr Engin Inform 9:573–581. https://doi.org/10.11591/eei.v9i2.2068
Bharathi DA, Anitha P (2017) High-Security Data Hiding In Videos Using Multi-Frame , Image Cropping , and LSB Algorithm. Int J Adv Research, Ideas Innov Technol 3:693–698
Butun I, Österberg P and Song H (2020) Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. In IEEE Commun Surv Tutor, vol. 22, no. 1, pp. 616–644. https://doi.org/10.1109/COMST.2019.2953364
California US (1977) The USC-SIPI Image Database, California
Chichester, UK (2017) Wiley-IEEE Press, pp. 1–472.; Z. Lv, L. Qiao, J. Li and H. Song, "Deep-Learning-Enabled Security Issues in the Internet of Things," in IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9531–9538, 15 June15, 2021, https://doi.org/10.1109/JIOT.2020.3007130.
Evsutin O, Melman A, Meshcheryakov R (2020) Digital steganography and watermarking for digital images: A review of current research directions. IEEE Access 8:166589–166611. https://doi.org/10.1109/ACCESS.2020.3022779
Hasan MK, Islam S, Sulaiman R, Khan S, Hashim AHA, Habib S, Islam M, Alyahya S, Ahmed MM, Kamil S, Hassan MA (2021) Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications. IEEE Access 9:47731–47742. https://doi.org/10.1109/ACCESS.2021.3061710
Hasan MK, Shafiq M, Islam S, Pandey B, Baker El-Ebiary YA, Nafi NS, Ciro Rodriguez R, Vargas DE (2021) Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications. Complexity.
Hashim MM, Mohd Rahim MS, Alwan AA (2018) A review and open issues of multifarious image steganography techniques in spatial domain. J Theor Appl Inf Technol 96:956–977
Hsiao TC, Liu DX, Chen TL, Chen CC (2021) Research on image steganography based on sudoku matrix. Symmetry (Basel) 13:1–11. https://doi.org/10.3390/sym13030387
Hussain M, Wahab AWA, Bin Idris YI, Ho ATS, Jung KH (2018) Image steganography in spatial domain: A survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012
Jana S, Maji AK, Pal RK (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding. Innov Syst Softw Eng 15:65–73. https://doi.org/10.1007/s11334-019-00324-8
Jansi KR, Muthusamy SH (2020) Steganographic Approach to Enhance Secure Data Communication Using Nonograms. Adv Intel Syst Comput 1056:701–712. https://doi.org/10.1007/978-981-15-0199-9_60
Jung KH, Yoo KY (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl 74:2143–2155. https://doi.org/10.1007/s11042-013-1832-y
Kamil S, Authors MA, Abdullah SNHS, Ahmad Z (2018) Lightweight and optimized multi-layer data hiding using video steganography paper. Int J Adv Comput Sci Appl 9:256–262. https://doi.org/10.14569/IJACSA.2018.091237
Kieu TD, Wang ZH, Chang CC, Li MC (2009) A sudoku based wet paper hiding scheme. Int J Smart Home 3:1–12
Lee CF, Shen JJ, Agrawal S, Wang YX, Lee YH (2020) Data Hiding Method Based on 3D Magic Cube. IEEE Access 8:39445–39453. https://doi.org/10.1109/ACCESS.2020.2975385
Liu Y, Wang J, Li J, Niu S and Song H (2021) Class-Incremental Learning for Wireless Device Identification in IoT. In IEEE Internet Things J, vol. 8, no. 23, pp. 17227–17235, 1. https://doi.org/10.1109/JIOT.2021.3078407
Liu Y, Wang J, Li J, Niu S, Song H (n.d.) Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey. In: IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2021.3099028
Lyu W, Yin D, Zhang Y, Deng J (2018) A Reliable Data Hiding Scheme Using Jigsaw Sudoku. Int Conf Netw, Commun, Comput Engin 147:805–812. https://doi.org/10.2991/ncce-18.2018.133
Lyu W, Yin D, Zhang Y, Deng J (2018) A Reliable Data Hiding Scheme Using Jigsaw Sudoku. https://doi.org/10.2991/ncce-18.2018.133
Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ - Comput 31:335–347. https://doi.org/10.1016/j.jksuci.2018.01.011
Mohamed MH, Mohamed LM (2016) High capacity image steganography technique based on LSB substitution method. App Mathem Inform Sci Lett 10:259–266. https://doi.org/10.18576/amis/100126
Premamayudu B, Venkatarao K, Teja MK, Krishna MH, Mukesh K (2011) Steganography using Hexa Sudoku Puzzle in Color Images. Int J Technol Engin Syst (IJTES) 2:133–137
Rahman S, Masood F, Khan WU, Ullah N, Khan FQ, Tsaramirsis G, Jan S, Ashraf M (2020) A novel approach of image steganography for secure communication based on LSB substitution technique. Comput Mater Contin 64:31–61. https://doi.org/10.32604/CMC.2020.09186
Shalu YS (2019) A review on game based steganography. Int Conf Intel Sustain Syst 286–290. https://doi.org/10.1109/ISS1.2019.8908097
Singh S (2020) Adaptive PVD and LSB based high capacity data hiding scheme. Multimed Tools Appl 79:18815–18837. https://doi.org/10.1007/s11042-020-08745-5
Solak S (2020) High embedding capacity data hiding technique based on emsd and lsb substitution algorithms. IEEE Access 8:166513–166524. https://doi.org/10.1109/ACCESS.2020.3023197
Houbing Song, Glenn A. Fink, and Sabina Jeschke, Security and Privacy in Cyber-Physical Systems: Foundations, Principl Appl ISBN: 978-1-119-22604-8,
Su W, Ni J, Hu X, Fridrich J (2021) Image Steganography with Symmetric Embedding Using Gaussian Markov Random Field Model. IEEE Trans Circuits Syst Video Technol 31:1001–1015. https://doi.org/10.1109/TCSVT.2020.3001122
Sushma RB, Namitha MV, Manjula GR, Johar S, Hiriyanna GS (2019) DNA based Steganography Using 2-3-3 Technique, 2019 Int. Conf Data Sci Commun 19–24. https://doi.org/10.1109/IconDSC.2019.8816945
Tang W, Li B, Tan S, Barni M, Huang J (2019) CNN-Based Adversarial Embedding for Image Steganography. IEEE Transac Inform Foren Sec 14:2074–2087. https://doi.org/10.1109/TIFS.2019.2891237
Tseng HW, Leng HS (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8:647–654. https://doi.org/10.1049/iet-ipr.2013.0584
Vidya G, Hema Preetha R, Shilpa GS, Kalpana V (2014) Image steganography using Ken Ken puzzle for secure data hiding. Indian J Sci Technol 7:1403–1413. https://doi.org/10.17485/ijst/2014/v7i9.13
Wazirali R, Alasmary W, Mahmoud MMEA, Alhindi A (2019) An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms. IEEE Access 7:133496–133508. https://doi.org/10.1109/ACCESS.2019.2941440
Wei W, Fan X, Song H et al (2019) Video tamper detection based on multi-scale mutual information. Multimed Tools Appl 78:27109–27126. https://doi.org/10.1007/s11042-017-5083-1
Weng S, Chen Y, Ou B, Chang CC, Zhang C (2019) Improved K-Pass Pixel Value Ordering Based Data Hiding. IEEE Access 7:34570–34582. https://doi.org/10.1109/ACCESS.2019.2904174
Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. J Inf Secure Appl 26:1–7. https://doi.org/10.1016/j.jisa.2015.08.003
Acknowledgments
We would also like to thank Prof Dr. Masri Ayob for their valuable inputs.
Funding
This work was supported by Universiti Kebangsaan Malaysia under research LRGS-1-2019-UKM-UKM-2-7.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The author declares that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kamil, S., Abdullah, S.N.H.S., Hasan, M.K. et al. Binary nonogram puzzle based data hiding technique for data security. Multimed Tools Appl 83, 4951–4992 (2024). https://doi.org/10.1007/s11042-023-15618-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15618-0