Skip to main content

Advertisement

Log in

A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new chaotic steganography method based on Fuzzy Inference System (FIS), using Discrete Cosine Transform (DCT) on color and grayscale images is proposed. The proposed algorithm is designed in three different approaches to have important factors of robustness, imperceptibility, and transparency with respect to applications. In order to achieve this goal, important parameters in the Human Visual System (HVS), such as texture and luminance, using DCT coefficients are computed. For more precision and flexibility in selecting host blocks for embedding, FIS system is used. Due to the importance of robustness and transparency in different applications, the best target host blocks are intelligently determined using the degree defined in the fuzzy system. This flexibility greatly enhances the efficiency of the algorithm in various using goals. One of the outstanding aspects of the proposed method is error controlling with increasing capacity. At first, embedding is done on middle frequency (MF) then to increase the capacity, coefficients in high frequency are also considered with two different zigzag scanning directions in selection, middle to high (MHF) and high to middle (HMF). The ordering selection of different color channels (for color image), blocks, coefficients in embedding phase, and encryption algorithm of secret message are done by chaotic sequences which has a positive impact on security level. Providing an efficient integration technique (synchronization) in the number of coefficients of each block leads to increasing the security of the proposed method. One of best novelty which causes decreasing bit error rate (BER) beside increasing capacity, is approximating of the distortion during DCT and IDCT operations in embedding phase. The experimental results demonstrate that high level of transparency and robustness for MF, and if more capacity is needed, although both algorithms HMF and MHF have desirable results, but HMF provides higher level of transparency and MHF more robustness against noises and attacks which can be used with respect to applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig 1.
Fig 2.
Fig 3.
Fig 4.
Fig 5
Fig 6.
Fig. 7.
Fig. 8.
Fig 9.
Fig. 10.
Fig. 11.
Fig. 12.
Fig. 13.
Fig. 14.
Fig 15.
Fig 16.
Fig 17.
Fig 18.
Fig. 19.
Fig. 20.

Similar content being viewed by others

References

  1. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306

    Google Scholar 

  2. Artz D (2001) Digital steganography: hiding data within data. IEEE Internet Comput 5(3):75–80

    Google Scholar 

  3. Baig F, Khan MF, Beg S, Shah T, Saleem K (2016) Onion steganography: a novel layering approach. Nonlinear Dynamics 84(3):1431–1446

    MathSciNet  Google Scholar 

  4. Bovik AC (ed) (2009) The essential guide to image processing. Academic Press, Cambridge

    Google Scholar 

  5. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    MATH  Google Scholar 

  6. Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1):123–138

    MATH  Google Scholar 

  7. Chen, YZ, Han Z, Li SP, Lu CH, Yao XH (2010) An adaptive steganography algorithm based on block sensitivity vectors using HVS features. In Image and Signal Processing (CISP), 2010 3rd International Congress on (Vol. 3, pp. 1151–1155). IEEE

  8. Chowdhuri P, Jana B, Giri D (2018) Secured steganographic scheme for highly compressed color image using weighted matrix through DCT. Int J Comput Appl 7:1–12

    Google Scholar 

  9. Chowdhuri P, Jana B, Giri D (2018) A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain. In International Conference on Mathematics and Computing, pp. 27–35. Springer, Singapore.

    Google Scholar 

  10. Dande SC, Agrawal SS, Hirekhan SR (2016, April) Implementation of colour image steganography using LSB and edge detection technique: A LabVIEW approach. In Communication and Signal Processing (ICCSP), 2016 International Conference on (pp. 1466–1470). IEEE.

  11. Darshni P, Ghanekar U (2015) A Hybrid Data Hiding Scheme to Enhance the Capacity of One-Third Probability Embedding Method. In Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on (pp. 269–272). IEEE

  12. Doğan Ş (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46(1):129–143

    MathSciNet  Google Scholar 

  13. El-Rahman SA (2018) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70:380–399

    MathSciNet  Google Scholar 

  14. Fan L, Gao T, Cao Y (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng 39(3):873–881

    Google Scholar 

  15. Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  16. Hu HT, Chang JR, Hsu LY (2016) Robust blind image watermarking by modulating the mean of partly sign-altered DCT coefficients guided by human visual perception. AEU-International Journal of Electronics and Communications 70(10):1374–1381

    Google Scholar 

  17. Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Transactions on Information Forensics and Security 7(4):1181–1191

    Google Scholar 

  18. Hussain M, Wahab AW, Idris YI, Ho AT, Jung KH (2018) Image steganography in spatial domain: A survey. Signal Process Image Commun 65:46–66

    Google Scholar 

  19. Jagadeesh B, Kumar PR, Reddy PC (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20(9):3679–3686

    Google Scholar 

  20. Ker AD (2005) A general framework for structural steganalysis of LSB replacement. In International Workshop on Information Hiding. Springer Berlin Heidelberg, pp 296–311

    Google Scholar 

  21. Kocarev L, Lian S (2011) Chaos-based cryptography: Theory, algorithms and applications. Springer Science & Business Media, Berlin

    MATH  Google Scholar 

  22. Kumar S, Singh A, Kumar M (2019) Information hiding with adaptive steganography based on novel fuzzy edge identification. Defence Technology 15(2):162–169

    Google Scholar 

  23. Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56–75

    Google Scholar 

  24. Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Process Mag 17(5):20–46

    Google Scholar 

  25. Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Transactions on Multimedia 12(5):345–357

    Google Scholar 

  26. Lin CC, Shiu PF (2010) High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing 1(3):220–240

    Google Scholar 

  27. Lou DC, Hu MC, Liu JL (2008) Healthcare image watermarking scheme based on human visual model and back-propagation network. Journal of CCIT 37(1):151–162

    Google Scholar 

  28. Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl:13133–13144

    Google Scholar 

  29. Morkel T, Eloff JH, Olivier MS (2005) An overview of image steganography. In ISSA (pp. 1–11)

  30. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76(6):8597–8626

    Google Scholar 

  31. Nazari M, Sharif A, Mollaeefar M (2016) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl:1–17

  32. Nikooghadam M, Jahantigh R, Arshad H (2016) A lightweight authentication and key agreement protocol preserving user anonymity. Multimed Tools Appl:1–23

  33. Oueslati S, Cherif A, Solaiman B (2010) A fuzzy watermarking approach based on the human visual system. International Journal of Image Processing 4(3):218–231

    Google Scholar 

  34. Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE security & privacy 99(3):32–44

    Google Scholar 

  35. Raid AM, Khedr WM, El-Dosuky MA, Ahmed W (2014) JPEG image compression using discrete cosine transform-A Survey. arXiv preprint arXiv:1405.6147

  36. Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510

    Google Scholar 

  37. Sajasi S, Moghadam AME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389

    Google Scholar 

  38. Sajedi H, Jamzad M (2008) Cover selection steganography method based on similarity of image blocks. In Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th International Conference on (pp. 379–384). IEEE

  39. Sakr N, Zhao J, Groza V (2005) A dynamic fuzzy logic approach to adaptive HVS-based watermarking. In Haptic Audio Visual Environments and their Applications, 2005. IEEE International Workshop on (pp. 6-pp). IEEE

  40. Shi YQ, Sun H (1999) Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards. CRC press, Boca Raton

    Google Scholar 

  41. Silman J (2001) Steganography and steganalysis: an overview. Sans Institute 3:61–76

    Google Scholar 

  42. Srivastava A, Lee AB, Simoncelli EP, Zhu SC (2003) On advances in statistical modeling of natural images. Journal of mathematical imaging and vision 18(1):17–33

    MathSciNet  MATH  Google Scholar 

  43. Suchitra B, Priya M, Raju J (2013) Image Steganography Based On DCT Algorithm for Data Hiding. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2(11)

  44. Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2):297–306

    Google Scholar 

  45. Vanmathi C, Prabu S (2018) Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility. International Journal of Fuzzy Systems 20(2):460–473

    Google Scholar 

  46. Walia E, Jain P, Navdeep N (2010) An analysis of LSB & DCT based steganography. Global Journal of Computer Science and Technology 10(1)

  47. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error measurement to structural similarity. IEEE Trans Image Process 13(1)

  48. Yang CN, Kim C, Lo YH (2018) Adaptive real-time reversible data hiding for JPEG images. J Real-Time Image Proc 14(1):147–157

    Google Scholar 

  49. Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats. J Syst Softw 98:140–154

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iman Dorostkar Ahmadi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nazari, M., Dorostkar Ahmadi, I. A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl 79, 13693–13724 (2020). https://doi.org/10.1007/s11042-019-08415-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08415-1

Keywords

Navigation