Skip to main content

Advertisement

Log in

Two-dimensional modified pixel value differencing (\(2D-MPVD\)) image steganography with error control and security using stream encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Along with the development of communication networks and the facilitation of multimedia data transmission, the issue of data security is always raised, and there is a concern that the data will reach the recipient without any changes or distortions. Information security is achieved through three essential mechanisms: encryption, steganography and watermarking. In this research, a proposed steganography mechanism is used to hide information in the image media, which includes the main features of high capacity, confidentiality, and integrity. Stream cipher and checksum error control are used to maintain the confidentiality and integrity of information hidden in the digital media, respectively. Two-dimensional pixel difference (\(2D-MPVD\)) is used in the proposed digital imaging method, which hides bits of the secret message in 8 pairs of pixels of non-overlapping sub-images with size \(4\times 4\). MPVD is a modified PVD method that embeds a pair of pixels in each area of the image. It has a high embedding capacity and a zero-extraction error. The \(2D-MPVD\) steganography can embed a large number of secret message bits into a digital cover image with high imperceptibility as it makes use of the features of human visual sensitivity. Additionally, \(2D-MPVD\) uses cryptography keys and permutation keys to encrypt the secret message in pixels pairs, greatly enhancing its security. The results of the proposed algorithm on different images show a good structural similarity between the cover image and the stego image, and also the standard values of the peak signal-to-noise (PSNR) ratio and the capacity to embed information are desirable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Data Availability Statement (DAS)

No datasets were generated or analysed during the current study, but I am willing to send the source code to reviewers if they are interested.

References

  1. Almazaydeh WIA, Sheshadri HS (2018) “Image Steganography Using a Dynamic Symmetric Key,” In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, pp. 1507–1513

  2. Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229

    Article  ADS  MathSciNet  PubMed  Google Scholar 

  3. Bairagi AK, Khondoker R, Islam R (2016) “An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures,” Inf Secur J Glob Perspect, vol. 25, no. 197–212

  4. Chanil Pak KK, Kim J, An K, Kim C, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79:1409–1425

    Article  Google Scholar 

  5. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital Watermarking and Steganography, 2nd(ed) San Francisco, CA, USA: Morgan Kaufmann Publishers Inc

  6. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recog Lett 24:1613–1626

    Article  ADS  Google Scholar 

  7. Duan X, Nao L, Mengxiao G, Yue D, Xie Z, Ma Y, Qin C (2020) “High-Capacity Image Steganography Based on Improved FC-DenseNet,” IEEE Access, 8:170 174–170 182. [Online] Available: https://ieeexplore.ieee.org/document/9197597/

  8. Forouzan BA (2008) Cryptography and Network Security. McGraw-Hill press

  9. Forouzan BA (2021) Data Communications and Networking, 5th edn. Prentice Hall

    Google Scholar 

  10. Fridrich J, Goljan M (2002) “Practical steganalysis of digital images: state of the art,” In Electronic Imaging, Delp EJ III, Wong PW, (eds.), pp. 1–13

  11. Gnanasundaram S, Shrivastava A (2012) Eds., Information Storage and Management second edition, 2nd edn. John Wiley and Sons, Inc

  12. Gopalakrishnan Nair MSTR, Suma V (2011) “Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis,” In Swarm Evolutionary and Memetric Computing Conference (SEMCCO)

  13. Hamid BIBN, Sumait BS, Al-Qershi O, (2021) “Enhancing visual quality of spatial image steganography using SqueezeNet deep learning network,” Multimed Tools Appl, 80:36 093–36 109

  14. Hashim MMHSH, Rahim MSM, Johi FA, Taha MS, (2018) “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats,” Int J Eng Tech(UAE), vol. 4, no. 7, 3505–3514

  15. Hosam O, Halima NB (2016) “Adaptive block-based pixel value differencing steganography,” Security and Communication Networks, vol. 9, no. 18, 5036–5050. [Online] Available: https://doi.org/10.1002/sec.1676

  16. Huang C-T, Tsai M-Y, Lin L-C, Wang W-J, Wang S-J (2018) VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J Supercomput 74(9):4295–4314

    Article  Google Scholar 

  17. Hussain MJK, Wahab AWA, Ho AT, Javed N (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57

    Article  Google Scholar 

  18. Hussain M, Riaz Q, Saleem S, Ghafoor A, Jung K-H (2021) “Enhanced adaptive data hiding method using LSB and pixel value differencing,” Multimedia Tools and Appl., vol. 80, no. 13, 20 381–20 401, Mar. 2021. [Online] Available: https://doi.org/10.1007/s11042-021-10652-2

  19. Huwaida MMM, Elshoush T, Altigani A (2022) A new high capacity and secure image realization steganography based on ASCII code matching. Multimed Tools Appl 81:5191–5237

    Article  Google Scholar 

  20. Jung K-H (2010) “High-capacity steganographic method based on pixel-value differencing and LSB replacement methods,” The Imaging Science Journal, vol. 58, no. 4, 213–221. [Online] Available: https://doi.org/10.1179/136821910x12651933390584

  21. Khodaei MFK, Sadeghi Bigham B (2016) Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst 47(8):617–628

    Article  Google Scholar 

  22. Knuth DE (1985) Dynamic huffman coding. J Algorithm 6(2):163–180

    Article  MathSciNet  Google Scholar 

  23. Kumar M, Rattan R (2012) “Analysis of various quality metrics for medical image processing,” Int J Adv Res Comput Sci Softw Eng, vol. 2, no. 11

  24. Li YLX, Bian W (2021) “Retracing extended sudoku matrix for high-capacity image steganography,” Multimed Tools Appl, 80:18 627–18 651

  25. Li Z, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J. Inf Secur Appl 43:47–52

    CAS  Google Scholar 

  26. Liao X, Wen QY (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8

    Article  Google Scholar 

  27. Meshcheryakov OEAMR (2020) “Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions,” IEEE Access, 8:166 589–166 611

  28. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  ADS  Google Scholar 

  29. Newaj Bhuiyan SS, Malek NA, Khalifa OO, Abdul Rahman FD (2018) An Improved Image Steganography Algorithm Based on PVD. Indones J Electr Eng Comput Sc 10(2):569

    Google Scholar 

  30. Parah SA, Sheikh JA, Ahad F, Bhat GM, (2018) “High capacity and secure electronic patient record (EPR) embedding in color images for IoT driven healthcare systems,” Internet of Things and Big Data Analytics Toward Next-Gener Intell 409–437

  31. Ray SKGB, Mukhopadhyay S, Hossain S, Sarkar R (2021) “Image steganography using deep learning based edge detection,” Multimed Tools Appl, 80:33 475–33 503

  32. Sahu AKSG (2020) “An improved method for high hiding capacity based on LSB and PVD,” Digit Media Steganography Princ. Algorithm, Adv, 41–6

  33. Sahu AK, Swain G (2018) “Pixel Overlapping Image Steganography Using PVD and Modulus Function,” 3D Research, vol. 9, no. 3, 40

  34. Schaefer GSM (2004) “UCID: an uncompressed color image database, in Electronic Imaging 2004” Tech Rep

  35. Schneier B (1995) Cryptography: Theory and Practice. CRC Press, Boca Raton

    Google Scholar 

  36. Setiadi PNA, Moses DRI (2022) “Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity,” Multimed Tools Appl

  37. Setiadi DRIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423–8444

    Article  Google Scholar 

  38. Siddiqui GF, Iqbal MZ, Saleem K, Saeed Z, Ahmed A, Hameed IA, Khan MF (2020) “A dynamic three-bit image steganography algorithm for medical and e-healthcare systems,” IEEE Access, 8:181 893–181 903. [Online] Available: https://doi.org/10.1109/access.2020.3028315

  39. Singh G, Supriya S (2013) A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. Int J Comput Appl 67(19):34

    Google Scholar 

  40. Stalling W (2018) Cryptography and Network Security: Principles and Practice 7th Edn. Pearson press

  41. Swain G (2014) “Digital Image Steganography using Nine-Pixel Differencing and Modified LSB Substitution,” Indian J Sci Tech, vol. 7(9)

  42. Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44

    Article  Google Scholar 

  43. Swain SK, Lenka G (2014) Classification of spatial domain image steganography techniques: a study. Int J Comput Sci Eng Technol 5(3):219–232

    Google Scholar 

  44. Taha MMHMS, RMSM, Khalid HN (2022) “High payload image steganography scheme with minimum distortion based on distinction grade value method,” Multimed Tools Appl 81:25 913–25 946

  45. Tseng H-W, Leng H-S (2022) A reversible modified least significant bit (LSB) matching revisited method. Signal Process Image Commun 101(116556):11655

    Google Scholar 

  46. Voloshynovskiy SV, Pereira S, Herrigel A, Baumgartner N, Pun T (2000) “Generalized watermarking attack based on watermark estimation and perceptual remodulation,” In Proceedings of SPIE - The International Society for Optical Engineering, pp. 358–370

  47. Wang CMHM, Wu NI, Tsai CS (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81(1):150–158

    Article  Google Scholar 

  48. Wang W, Kong S, Razi A, Feng X (2017) “Image Regularity and Fidelity Measure with a Two-Modality Potential Function,” Math Probl Eng 1–14

  49. Wu HCHM, Wu NI, Tsai CS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc-Vision Image Signal Process 152(5):611–615

    Article  Google Scholar 

  50. Xu L, Li Z, Li J, Hua W (2016) “A novel bit-level image encryption algorithm based on chaotic maps,” Optics and Lasers in Engineering, 78:17–25. [Online] Available: https://linkinghub.elsevier.com/retrieve/pii/S0143816615002109

  51. Yang Z, Wang K, Ma S, Huang Y, Kang X, Zhao X (2019) Istego100k: Large-scale image steganalysis dataset. Springer, In International Workshop on Digital Watermarking

    Google Scholar 

  52. Zenati WOA, Alimi AM (2021) “A new digital steganography system based on hiding online signature within document image data in YUV color space,” Multimed Tools Appl 80:18 653–18 676

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Broumandnia.

Ethics declarations

Competing of interest

The author declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Broumandnia, A. Two-dimensional modified pixel value differencing (\(2D-MPVD\)) image steganography with error control and security using stream encryption. Multimed Tools Appl 83, 21967–22003 (2024). https://doi.org/10.1007/s11042-023-16268-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16268-y

Keywords

Navigation