Abstract
Social networks are major sources of image sharing and secret messaging among the people. To date, such networks are not strictly bounded by copyright laws due to which image sharing, secret messaging, and its authentication is vulnerable to many risks. In addition to this, maintaining the confidentiality, integrity, and authenticity of secret messages is an open challenge of today’s communication systems. Steganography is one of the solutions to tackle these problems. This paper proposes a secure crystographic framework for authenticity of visual contents using image steganography, utilizing color model transformation, three-level encryption algorithm (TLEA), and Morton scanning (MS)-directed least significant bit (LSB) substitution. The method uses I-plane of the input image in HSI for secret data embedding using MS-directed LSB substitution method. Furthermore, the secret data is encrypted using TLEA prior to embedding, adding an additional level of security for secure authentication. The qualitative and quantitative results verify the better performance of the proposed scheme and provide one of the best mechanisms for authenticity of visual contents in social networks.
Similar content being viewed by others
References
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal and Image Processing 1:196–204
Al-Otaibi NA, Gutub AA (2014a) 2-Leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2:151–157
Al-Otaibi NA, Gutub AA (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), pp 250–256
Amirtharajan R, Archana P, Rajesh V, Devipriya G, Rayappan J, (2013) Standard deviation converges for random image steganography. In: Information & Communication Technologies (ICT), 2013 I.E. Conference on, 2013, pp 1064–1069
Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimedia Tools and Applications 30:55–88
Buke A, Gaoli F, Yongcai W, Lei S, Zhiqi Y (2015) Healthcare algorithms by wearable inertial sensors: a survey. Communications, China 12:1–12
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752
Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995–2007
Grover N, Mohapatra A, (2013a) Digital Image Authentication Model Based on Edge Adaptive Steganography. In: Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, 2013, pp 238–242
Grover N, Mohapatra A, (2013b) Digital image authentication model based on edge adaptive steganography. In: 2013 2nd International Conference on Advanced Computing, Networking and Security, pp 238–242
Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2:56–64
Gutub A, (2015) Social Media & its Impact on e-governance. ME Smart Cities 2015-4th Middle East Smart Cities Summit
Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A, (2008) Pixel indicator high capacity technique for RGB image based Steganography. In WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications
Hamza R, Titouna F, (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 1–18. doi:10.1080/19393555.2016.1212954
Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524
Jan Z, Mirza AM (2012) Genetic programming-based perceptual shaping of a digital watermark in the wavelet domain using Morton scanning. J Chin Inst Eng 35:85–99
Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130
Karim M, (2011) A new approach for LSB based image steganography using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011), pp 286–291
Ker AD (2005) A general framework for structural steganalysis of LSB replacement. Information Hiding 2005:296–311
Liu Z, Zhang F, Wang J, Wang H, Huang J (2015) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157–166
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214
Mehmood I, Sajjad M, Baik SW (2014) Mobile-cloud assisted video summarization framework for efficient Management of Remote Sensing Data Generated by wireless capsule sensors. Sensors 14:17112–17145
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287
Mstafa RJ, Elleithy KM (2016a) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications 75:10311–10333
Mstafa RJ, Elleithy KM, (2016b) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools and Applications 1–38. doi:10.1007/s11042-016-4055-1
Muhammad K, Ahmad J, Rehman NU, Jan Z, Qureshi RJ (2015a) A secure cyclic steganographic technique for color images using randomization. Technical Journal, University of Engineering and Technology Taxila 19:57–64
Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015b) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962
Muhammad K, Ahmad J, Sajjad M, Zubair M (2015c) Secure image steganography using cryptography and image transposition. NED Univ J Res 12:81–91
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016a) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75:14867–14893
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M, (2016b) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications 1–30. doi:10.1007/s11042-016-3383-5
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW, (2016c) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Generation Computer Systems. doi:10.1016/j.future.2016.11.029
Muhammad K, Sajjad M, Baik SW (2016d) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16
Muhammad K, Ahmad J, Sajjad M, Baik SW (2016e) Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems. Springer Plus 5:1495
Muhammad K, Sajjad M, Lee MY, Baik SW (2017) Efficient visual attention driven framework for key frames extraction from hysteroscopy videos. Biomed Signal Process Control 33:161–168
Parvez MT and Gutub AA-A (2008) RGB intensity based variable-bits image steganography. In Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE, pp 1322–1327
Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142
Patsakis C, Zigomitros A, Papageorgiou A, Solanas A (2015) Privacy and security for multimedia content shared on OSNs: issues and countermeasures. Comput J 58:518–535
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB < sup > ++</sup>. Inf Sci 277:90–101
Sheikh HR, Wang Z, Bovik AC, Cormack L (2003) Image and video quality assessment research at LIVE
Swain G, Lenka SK (2012) A novel approach to RGB Channel based image steganography technique. Int Arab J e-Technol 2:181–186
Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-International Journal for Light and Electron Optics 125(15):3972–3976. doi:10.1016/j.ijleo.2014.01.149
Wu N-I, Hwang M-S (2007) Data hiding: current status and key issues. IJ Network Security 4:1–9
Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626
Zhou W, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612
Acknowledgement
This work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1A09919551).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Muhammad, K., Ahmad, J., Rho, S. et al. Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76, 18985–19004 (2017). https://doi.org/10.1007/s11042-017-4420-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4420-8