Abstract
Along with the development of communication networks and the facilitation of multimedia data transmission, the issue of data security is always raised, and there is a concern that the data will reach the recipient without any changes or distortions. Information security is achieved through three essential mechanisms: encryption, steganography and watermarking. In this research, a proposed steganography mechanism is used to hide information in the image media, which includes the main features of high capacity, confidentiality, and integrity. Stream cipher and checksum error control are used to maintain the confidentiality and integrity of information hidden in the digital media, respectively. Two-dimensional pixel difference (\(2D-MPVD\)) is used in the proposed digital imaging method, which hides bits of the secret message in 8 pairs of pixels of non-overlapping sub-images with size \(4\times 4\). MPVD is a modified PVD method that embeds a pair of pixels in each area of the image. It has a high embedding capacity and a zero-extraction error. The \(2D-MPVD\) steganography can embed a large number of secret message bits into a digital cover image with high imperceptibility as it makes use of the features of human visual sensitivity. Additionally, \(2D-MPVD\) uses cryptography keys and permutation keys to encrypt the secret message in pixels pairs, greatly enhancing its security. The results of the proposed algorithm on different images show a good structural similarity between the cover image and the stego image, and also the standard values of the peak signal-to-noise (PSNR) ratio and the capacity to embed information are desirable.
Similar content being viewed by others
Data Availability Statement (DAS)
No datasets were generated or analysed during the current study, but I am willing to send the source code to reviewers if they are interested.
References
Almazaydeh WIA, Sheshadri HS (2018) “Image Steganography Using a Dynamic Symmetric Key,” In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, pp. 1507–1513
Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229
Bairagi AK, Khondoker R, Islam R (2016) “An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures,” Inf Secur J Glob Perspect, vol. 25, no. 197–212
Chanil Pak KK, Kim J, An K, Kim C, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79:1409–1425
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital Watermarking and Steganography, 2nd(ed) San Francisco, CA, USA: Morgan Kaufmann Publishers Inc
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recog Lett 24:1613–1626
Duan X, Nao L, Mengxiao G, Yue D, Xie Z, Ma Y, Qin C (2020) “High-Capacity Image Steganography Based on Improved FC-DenseNet,” IEEE Access, 8:170 174–170 182. [Online] Available: https://ieeexplore.ieee.org/document/9197597/
Forouzan BA (2008) Cryptography and Network Security. McGraw-Hill press
Forouzan BA (2021) Data Communications and Networking, 5th edn. Prentice Hall
Fridrich J, Goljan M (2002) “Practical steganalysis of digital images: state of the art,” In Electronic Imaging, Delp EJ III, Wong PW, (eds.), pp. 1–13
Gnanasundaram S, Shrivastava A (2012) Eds., Information Storage and Management second edition, 2nd edn. John Wiley and Sons, Inc
Gopalakrishnan Nair MSTR, Suma V (2011) “Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis,” In Swarm Evolutionary and Memetric Computing Conference (SEMCCO)
Hamid BIBN, Sumait BS, Al-Qershi O, (2021) “Enhancing visual quality of spatial image steganography using SqueezeNet deep learning network,” Multimed Tools Appl, 80:36 093–36 109
Hashim MMHSH, Rahim MSM, Johi FA, Taha MS, (2018) “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats,” Int J Eng Tech(UAE), vol. 4, no. 7, 3505–3514
Hosam O, Halima NB (2016) “Adaptive block-based pixel value differencing steganography,” Security and Communication Networks, vol. 9, no. 18, 5036–5050. [Online] Available: https://doi.org/10.1002/sec.1676
Huang C-T, Tsai M-Y, Lin L-C, Wang W-J, Wang S-J (2018) VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J Supercomput 74(9):4295–4314
Hussain MJK, Wahab AWA, Ho AT, Javed N (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57
Hussain M, Riaz Q, Saleem S, Ghafoor A, Jung K-H (2021) “Enhanced adaptive data hiding method using LSB and pixel value differencing,” Multimedia Tools and Appl., vol. 80, no. 13, 20 381–20 401, Mar. 2021. [Online] Available: https://doi.org/10.1007/s11042-021-10652-2
Huwaida MMM, Elshoush T, Altigani A (2022) A new high capacity and secure image realization steganography based on ASCII code matching. Multimed Tools Appl 81:5191–5237
Jung K-H (2010) “High-capacity steganographic method based on pixel-value differencing and LSB replacement methods,” The Imaging Science Journal, vol. 58, no. 4, 213–221. [Online] Available: https://doi.org/10.1179/136821910x12651933390584
Khodaei MFK, Sadeghi Bigham B (2016) Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst 47(8):617–628
Knuth DE (1985) Dynamic huffman coding. J Algorithm 6(2):163–180
Kumar M, Rattan R (2012) “Analysis of various quality metrics for medical image processing,” Int J Adv Res Comput Sci Softw Eng, vol. 2, no. 11
Li YLX, Bian W (2021) “Retracing extended sudoku matrix for high-capacity image steganography,” Multimed Tools Appl, 80:18 627–18 651
Li Z, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J. Inf Secur Appl 43:47–52
Liao X, Wen QY (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8
Meshcheryakov OEAMR (2020) “Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions,” IEEE Access, 8:166 589–166 611
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Newaj Bhuiyan SS, Malek NA, Khalifa OO, Abdul Rahman FD (2018) An Improved Image Steganography Algorithm Based on PVD. Indones J Electr Eng Comput Sc 10(2):569
Parah SA, Sheikh JA, Ahad F, Bhat GM, (2018) “High capacity and secure electronic patient record (EPR) embedding in color images for IoT driven healthcare systems,” Internet of Things and Big Data Analytics Toward Next-Gener Intell 409–437
Ray SKGB, Mukhopadhyay S, Hossain S, Sarkar R (2021) “Image steganography using deep learning based edge detection,” Multimed Tools Appl, 80:33 475–33 503
Sahu AKSG (2020) “An improved method for high hiding capacity based on LSB and PVD,” Digit Media Steganography Princ. Algorithm, Adv, 41–6
Sahu AK, Swain G (2018) “Pixel Overlapping Image Steganography Using PVD and Modulus Function,” 3D Research, vol. 9, no. 3, 40
Schaefer GSM (2004) “UCID: an uncompressed color image database, in Electronic Imaging 2004” Tech Rep
Schneier B (1995) Cryptography: Theory and Practice. CRC Press, Boca Raton
Setiadi PNA, Moses DRI (2022) “Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity,” Multimed Tools Appl
Setiadi DRIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423–8444
Siddiqui GF, Iqbal MZ, Saleem K, Saeed Z, Ahmed A, Hameed IA, Khan MF (2020) “A dynamic three-bit image steganography algorithm for medical and e-healthcare systems,” IEEE Access, 8:181 893–181 903. [Online] Available: https://doi.org/10.1109/access.2020.3028315
Singh G, Supriya S (2013) A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. Int J Comput Appl 67(19):34
Stalling W (2018) Cryptography and Network Security: Principles and Practice 7th Edn. Pearson press
Swain G (2014) “Digital Image Steganography using Nine-Pixel Differencing and Modified LSB Substitution,” Indian J Sci Tech, vol. 7(9)
Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44
Swain SK, Lenka G (2014) Classification of spatial domain image steganography techniques: a study. Int J Comput Sci Eng Technol 5(3):219–232
Taha MMHMS, RMSM, Khalid HN (2022) “High payload image steganography scheme with minimum distortion based on distinction grade value method,” Multimed Tools Appl 81:25 913–25 946
Tseng H-W, Leng H-S (2022) A reversible modified least significant bit (LSB) matching revisited method. Signal Process Image Commun 101(116556):11655
Voloshynovskiy SV, Pereira S, Herrigel A, Baumgartner N, Pun T (2000) “Generalized watermarking attack based on watermark estimation and perceptual remodulation,” In Proceedings of SPIE - The International Society for Optical Engineering, pp. 358–370
Wang CMHM, Wu NI, Tsai CS (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81(1):150–158
Wang W, Kong S, Razi A, Feng X (2017) “Image Regularity and Fidelity Measure with a Two-Modality Potential Function,” Math Probl Eng 1–14
Wu HCHM, Wu NI, Tsai CS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc-Vision Image Signal Process 152(5):611–615
Xu L, Li Z, Li J, Hua W (2016) “A novel bit-level image encryption algorithm based on chaotic maps,” Optics and Lasers in Engineering, 78:17–25. [Online] Available: https://linkinghub.elsevier.com/retrieve/pii/S0143816615002109
Yang Z, Wang K, Ma S, Huang Y, Kang X, Zhao X (2019) Istego100k: Large-scale image steganalysis dataset. Springer, In International Workshop on Digital Watermarking
Zenati WOA, Alimi AM (2021) “A new digital steganography system based on hiding online signature within document image data in YUV color space,” Multimed Tools Appl 80:18 653–18 676
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing of interest
The author declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Broumandnia, A. Two-dimensional modified pixel value differencing (\(2D-MPVD\)) image steganography with error control and security using stream encryption. Multimed Tools Appl 83, 21967–22003 (2024). https://doi.org/10.1007/s11042-023-16268-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16268-y