Abstract
It is important to securely send information through the Internet; thus, technologies for safely exchanging information are required. One such technology is steganography, which conceals confidential data in multimedia. Although numerous embedding methods have been proposed, increasing embedding capacity, controlling image-quality degradation, and confidentiality are still issues that need to be addressed. There is a method that uses the correlation property of a maximum length sequence (M-sequence) to improve embedding capacity. However, since this method is used in watermarking, which is closely related to steganography, it cannot be directly applied to steganography, which requires a large amount of secret information to embed, because image quality would significantly degrade. We propose two steganography methods that use the correlation property of M-sequence. Particularly, we focused on the improvement of the intensity factor, which is a factor of image-quality degradation. As a result, a significant improvement in image quality was achieved.
Similar content being viewed by others
Data availability
The datasets generated during the current study are available from the corresponding author upon reasonable request.
References
Zebari DA, Zeebaree DQ, Saeed JN, Zebari NA, AL-Zebari A. Image steganography based on swarm intelligence algorithms: a survey. People. 2020;7(8):9.
Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: survey and analysis of current methods. Signal Process. 2010;90(3):727–52.
Sari CA, Rachmawanto EH, et al. Robust and imperceptible image watermarking by DC coefficients using singular value decomposition. In: 2017 4th International conference on electrical engineering, computer science and informatics (EECSI). IEEE; 2017. p. 1–5.
Evsutin O, Melman A, Meshcheryakov R. Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access. 2020;8:166589–611.
Laishram D, Tuithung T. A survey on digital image steganography: current trends and challenges. In: Proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT); 2018. p. 26–7.
Onuma K, Miyata S. A proposal for correlation-based steganography using Shamir’s secret sharing scheme and DCT domain. In: 2021 International conference on information networking (ICOIN). IEEE; 2021. p. 255–60.
Koda H, Furuta H, et al. A note on a correlation-based scheme of digital watermarking for images embedding the RDS in DCT domain (in Japanese). Bull Univ Electro-Commun. 2018;30(1):62–70.
Garg S, Singh R. An efficient method for digital image watermarking based on PN sequences. Int J Comput Sci Eng. 2012;4(9):1550.
Onuma K, Miyata S. A study of steganography based on error correction code and secret sharing scheme. In: 2020 3rd International conference on signal processing and information security (ICSPIS). IEEE; 2020. p. 1–4.
Akhtar N. An LSB substitution with bit inversion steganography method. In: Proceedings of 3rd international conference on advanced computing, networking and informatics; 2016. Berlin: Springer. p. 515–21.
Karthikeyan B, Deepak A, Subalakshmi KS, MM Anishin Raj, Vaithiyanathan V. A combined approach of steganography with LSB encoding technique and DES algorithm. In: 2017 Third international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB); 2017. IEEE. p. 85–8.
Kaur H, Rani J. A survey on different techniques of steganography. In: MATEC web of conferences, vol. 57; 2016. EDP Sciences. p. 02003.
Wazirali R, Alasmary W, Mahmoud MMEA, Alhindi A. An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access. 2019;7:133496–508.
El_Rahman SA. A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng. 2018;70:380–99.
Kumar V, Kumar D. A modified DWT-based image steganography technique. Multimedia Tools Appl. 2018;77(11):13279–308.
Sari WS, Rachmawanto EH, Setiadi DRIM, Sari CA. A good performance OTP encryption image based on DCT-DWT steganography. TELKOMNIKA Telecommun Comput Electron Control. 2017;15(4):1987–95.
Saejung S, Boondee A, Preechasuk J, Chantrapornchai C. On the comparison of digital image steganography algorithm based on DCT and wavelet. In: 2013 International computer science and engineering conference (ICSEC); 2013. IEEE. p. 328–33.
Nazari M, Ahmadi ID. A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimedia Tools Appl. 2020;79(19):13693–724.
Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process. 1997;6(12):1673–87.
Marvel LM, Boncelet CG, Retter CT. Spread spectrum image steganography. IEEE Trans Image Process. 1999;8(8):1075–83.
Kumar B, Singh HV, Singh SP, Mohan A, et al. Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur. 2011;2(02):91.
Kuznetsov A, Smirnov O, Onikiychuk A, Makushenko T, Anisimova O, Arischenko A. Adaptive pseudo-random sequence generation for spread spectrum image steganography. In: 2020 IEEE 11th international conference on dependable systems, services and technologies (DESSERT); 2020. IEEE. p. 161–5.
Fang Y, Huang J, Shi YQ. Image watermarking algorithm applying CDMA. In: Proceedings of the 2003 international symposium on circuits and systems, 2003. ISCAS’03, vol. 2; 2003. IEEE. p. II.
Najih MNM, Rachmawanto EH, Sari CA, Astuti S, et al. An improved secure image hiding technique using PN-sequence based on DCT-OTP. In: 2017 1st International conference on informatics and computational sciences (ICICoS); 2017. IEEE. p. 47–52.
Kaur B, Kaur A, Singh J. Steganographic approach for hiding image in DCT domain. Int J Adv Eng Technol. 2011;1(3):72.
Saidi M, Hermassi H, Rhouma R, Belghith S. A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 2017;76(11):13493–510.
Golomb SW, et al. Shift register sequences. Aegean Park Press; 1967.
Engelberg S, Benjamin H. Pseudorandom sequences and the measurement of the frequency response [instrumentation notes]. IEEE Instrum Meas Mag. 2005;8(1):54–9.
Singh RP, Khan MAA, Khan M, Singh N. Spread spectrum image steganography in multimedia messaging service of mobile phones. Int J Electron Eng. 2010;2(2):365–9.
Chatterjee A, Ghosal SK, Sarkar R. LSB based steganography with OCR: an intelligent amalgamation. Multimed Tools Appl. 2020;79(17–18):11747–65.
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–12.
Setiadi DRIM. PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools Appl. 2021;80:8423–44.
Al-Mansoori S, Kunhu A. Robust watermarking technique based on DCT to protect the ownership of Dubaisat-1 images against attacks. Int J Comput Sci Netw Secur. 2012;12(6):1.
Cuervo E, Wolman A, Cox LP, Lebeck K, Razeen A, Saroiu S, Musuvathi M. Kahawai: high-quality mobile gaming using GPU offload. In: Proceedings of the 13th annual international conference on mobile systems, applications, and services; 2015. p. 121–35.
Subhedar MS, Mankar VH. Current status and key issues in image steganography: a survey. Comput Sci Rev. 2014;13:95–113.
Acknowledgements
These research results were obtained from the commissioned research (No. 05201) by National Institute of Information and Communications Technology (NICT), Japan. This work was supported by JSPS KAKENHI Grant Numbers 19K11947, 22K12015, 22K12036.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Onuma, K., Miyata, S. An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT. SN COMPUT. SCI. 5, 12 (2024). https://doi.org/10.1007/s42979-023-02361-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02361-4