Skip to main content
Log in

Image steganography for authenticity of visual contents in social networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Social networks are major sources of image sharing and secret messaging among the people. To date, such networks are not strictly bounded by copyright laws due to which image sharing, secret messaging, and its authentication is vulnerable to many risks. In addition to this, maintaining the confidentiality, integrity, and authenticity of secret messages is an open challenge of today’s communication systems. Steganography is one of the solutions to tackle these problems. This paper proposes a secure crystographic framework for authenticity of visual contents using image steganography, utilizing color model transformation, three-level encryption algorithm (TLEA), and Morton scanning (MS)-directed least significant bit (LSB) substitution. The method uses I-plane of the input image in HSI for secret data embedding using MS-directed LSB substitution method. Furthermore, the secret data is encrypted using TLEA prior to embedding, adding an additional level of security for secure authentication. The qualitative and quantitative results verify the better performance of the proposed scheme and provide one of the best mechanisms for authenticity of visual contents in social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal and Image Processing 1:196–204

    Google Scholar 

  2. Al-Otaibi NA, Gutub AA (2014a) 2-Leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2:151–157

  3. Al-Otaibi NA, Gutub AA (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), pp 250–256

  4. Amirtharajan R, Archana P, Rajesh V, Devipriya G, Rayappan J, (2013) Standard deviation converges for random image steganography. In: Information & Communication Technologies (ICT), 2013 I.E. Conference on, 2013, pp 1064–1069

  5. Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimedia Tools and Applications 30:55–88

    Article  Google Scholar 

  6. Buke A, Gaoli F, Yongcai W, Lei S, Zhiqi Y (2015) Healthcare algorithms by wearable inertial sensors: a survey. Communications, China 12:1–12

    Article  Google Scholar 

  7. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752

    Article  MATH  Google Scholar 

  8. Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301

    Article  Google Scholar 

  9. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995–2007

    Article  MATH  Google Scholar 

  10. Grover N, Mohapatra A, (2013a) Digital Image Authentication Model Based on Edge Adaptive Steganography. In: Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, 2013, pp 238–242

  11. Grover N, Mohapatra A, (2013b) Digital image authentication model based on edge adaptive steganography. In: 2013 2nd International Conference on Advanced Computing, Networking and Security, pp 238–242

  12. Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2:56–64

    Google Scholar 

  13. Gutub A, (2015) Social Media & its Impact on e-governance. ME Smart Cities 2015-4th Middle East Smart Cities Summit

  14. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A, (2008) Pixel indicator high capacity technique for RGB image based Steganography. In WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications

  15. Hamza R, Titouna F, (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 1–18. doi:10.1080/19393555.2016.1212954

  16. Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524

    Article  Google Scholar 

  17. Jan Z, Mirza AM (2012) Genetic programming-based perceptual shaping of a digital watermark in the wavelet domain using Morton scanning. J Chin Inst Eng 35:85–99

    Article  Google Scholar 

  18. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130

    Article  Google Scholar 

  19. Karim M, (2011) A new approach for LSB based image steganography using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011), pp 286–291

  20. Ker AD (2005) A general framework for structural steganalysis of LSB replacement. Information Hiding 2005:296–311

    Article  Google Scholar 

  21. Liu Z, Zhang F, Wang J, Wang H, Huang J (2015) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157–166

    Article  Google Scholar 

  22. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214

    Article  Google Scholar 

  23. Mehmood I, Sajjad M, Baik SW (2014) Mobile-cloud assisted video summarization framework for efficient Management of Remote Sensing Data Generated by wireless capsule sensors. Sensors 14:17112–17145

    Article  Google Scholar 

  24. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287

    Article  Google Scholar 

  25. Mstafa RJ, Elleithy KM (2016a) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications 75:10311–10333

    Article  Google Scholar 

  26. Mstafa RJ, Elleithy KM, (2016b) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools and Applications 1–38. doi:10.1007/s11042-016-4055-1

  27. Muhammad K, Ahmad J, Rehman NU, Jan Z, Qureshi RJ (2015a) A secure cyclic steganographic technique for color images using randomization. Technical Journal, University of Engineering and Technology Taxila 19:57–64

    Google Scholar 

  28. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015b) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962

    Google Scholar 

  29. Muhammad K, Ahmad J, Sajjad M, Zubair M (2015c) Secure image steganography using cryptography and image transposition. NED Univ J Res 12:81–91

    Google Scholar 

  30. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016a) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75:14867–14893

    Article  Google Scholar 

  31. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M, (2016b) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications 1–30. doi:10.1007/s11042-016-3383-5

  32. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW, (2016c) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Generation Computer Systems. doi:10.1016/j.future.2016.11.029

  33. Muhammad K, Sajjad M, Baik SW (2016d) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16

    Article  Google Scholar 

  34. Muhammad K, Ahmad J, Sajjad M, Baik SW (2016e) Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems. Springer Plus 5:1495

    Article  Google Scholar 

  35. Muhammad K, Sajjad M, Lee MY, Baik SW (2017) Efficient visual attention driven framework for key frames extraction from hysteroscopy videos. Biomed Signal Process Control 33:161–168

    Article  Google Scholar 

  36. Parvez MT and Gutub AA-A (2008) RGB intensity based variable-bits image steganography. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE, pp 1322–1327

  37. Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142

    Google Scholar 

  38. Patsakis C, Zigomitros A, Papageorgiou A, Solanas A (2015) Privacy and security for multimedia content shared on OSNs: issues and countermeasures. Comput J 58:518–535

    Article  Google Scholar 

  39. Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB < sup > ++</sup>. Inf Sci 277:90–101

    Article  Google Scholar 

  40. Sheikh HR, Wang Z, Bovik AC, Cormack L (2003) Image and video quality assessment research at LIVE

  41. Swain G, Lenka SK (2012) A novel approach to RGB Channel based image steganography technique. Int Arab J e-Technol 2:181–186

    Google Scholar 

  42. Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-International Journal for Light and Electron Optics 125(15):3972–3976. doi:10.1016/j.ijleo.2014.01.149

  43. Wu N-I, Hwang M-S (2007) Data hiding: current status and key issues. IJ Network Security 4:1–9

    Google Scholar 

  44. Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626

    Article  MATH  Google Scholar 

  45. Zhou W, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1A09919551).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung Wook Baik.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammad, K., Ahmad, J., Rho, S. et al. Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76, 18985–19004 (2017). https://doi.org/10.1007/s11042-017-4420-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4420-8

Keywords

Navigation