Skip to main content
Log in

Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT)

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is a secure way of communicating secret visual data/information from one place to another via multimedia carriers. Digital steganography, spatial and frequency domain has taken several methods over the past two decades. In this work, we present steganography-assisted secure localization of smart devices for Visual Sensor Network (VSN). The proposed system is based on achromatic-component (Y-Plane) of the YCbCr color space and maximum likelihood estimation algorithm (MLEA) in the spatial domain. Data/information security via multimedia carriers is the main concern in this technological era, if secret information is captured by a Visual Sensor network, (VSN) then the capture information in the case to send from one place to another needs fundamental security to keep the information confidential. In the proposed steganography-assisted Visual Sensor Network (VSN) the camera nodes are intelligent to process the image data and to extract the important information and the rich-description are provided to the system’s user for further action. In the proposed technique first, the input image is rotated on 90 degrees and transformed into YCbCr color space. Furthermore, the secret data is separated into different blocks of the same size based on key giving sub-blocks in Y-Plane, secret information is then encrypted using an MLE algorithm (MLEA) and the corresponding blocks of secret data is embedded in the sub-image of Y-Plane. The experimental results authenticate that the proposed technique does not only boost the visual quality of stegno-images but also delivers good imperceptibility, robustness, and security as compared to state-of-the-art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of data and source code

Data sharing not applicable to this article as authors have used publicly available datasets, whose details are included in the “experimental results and discussions” section of this article. Please contact the authors for further requests.

References

  1. Agaian SS, Perez JP (2004) New pixel sorting method for palette based steganography and color model selection. The University of Texas, San Antonio

    Google Scholar 

  2. Agaian SS, Rodriguez B, Perez JP (2006) Stego sensitivity measure and multibit plane based steganography using different color models. in Electronic Imaging 2006. International Society for Optics and Photonics.

  3. Ahmad K, Ahmad SP (2019) A Comparative Study of Maximum Likelihood Estimation and Bayesian Estimation for Erlang Distribution and Its Applications, in Statistical Methodologies. IntechOpen

  4. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Article  Google Scholar 

  5. Baroffio L et al. (2015) A visual sensor network for parking lot occupancy detection in smart cities. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE

  6. Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  Google Scholar 

  7. Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595

    Article  Google Scholar 

  8. Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301

    Article  Google Scholar 

  9. Chen W, Xie M, Wu M (2016) Modified maximum likelihood estimator of scale parameter using moving extremes ranked set sampling. Communications in Statistics-Simulation and Computation 45(6):2232–2240

    Article  MathSciNet  Google Scholar 

  10. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  11. Gonzalez RC, Richard E (2002) Woods, digital image processing. ed: Prentice Hall Press, ISBN 0–201–18075-8

  12. Grover N, Mohapatra A (2013) Digital image authentication model based on edge adaptive steganography. In 2013 2nd International Conference on Advanced Computing, Networking and Security. IEEE

  13. Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of emerging technologies in web intelligence 2(1):56–64

    Google Scholar 

  14. Hassan A, Corbett CJ (2008) Wireless online cryptographic key generation method. Google Patents

  15. Hassanalieragh M et al. (2015) Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenges. In 2015 IEEE International Conference on Services Computing. IEEE

  16. Hiary S, Jafar I, Hiary H (2015) An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes. Multimed Tools Appl, p. 1–27

  17. Jafar I, Ying H (2008) New algorithms for contrast enhancement in grayscale images based on the variational definition of histogram equalization. Integrated Computer-Aided Engineering 15(2):131–147

    Article  Google Scholar 

  18. Jafar IF, Darabkh KA, Saifan RR (2016) SARDH: A Novel Sharpening-Aware Reversible Data Hiding Algorithm. Journal of Visual Communication and Image Representation

  19. Karim SM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. in 14th International Conference on Computer and Information Technology (ICCIT 2011). IEEE

  20. Lou D-C, Liu J-L (2002) Steganographic method for secure communications. Computers & Security 21(5):449–460

    Article  Google Scholar 

  21. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on information forensics and security 5(2):201–214

    Article  Google Scholar 

  22. Mielikainen J (2006) LSB matching revisited. IEEE signal processing letters 13(5):285–287

    Article  Google Scholar 

  23. Mostafa G, Alexan W (2019) A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding. In 2019 International Symposium on Networks, Computers and Communications (ISNCC). IEEE

  24. Muhammad K et al. (2015) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl, p. 1–27

  25. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 5, May. 2015 1938

  26. Mundher M, Muhamad D, Rehman A, Saba T, Kausar F (2014) Digital watermarking for images security using discrete slantlet transform. Applied Mathematics and Information Sciences 8(6):2823–2830. https://doi.org/10.12785/amis/080618

    Article  Google Scholar 

  27. Qu Z, Cheng Z, Liu W, Wang X (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimed Tools Appl 78(7):7981–8001

    Article  Google Scholar 

  28. Rehman A, Saba T, Mahmood T, Mehmood Z, Shah M, Anjum A (2018) Data hiding technique in steganography for information security using number theory. Journal of information science:1–12. https://doi.org/10.1177/0165551518816303

  29. Sajjad M, Mehmood I, Baik SW (2014) Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network. Sensors 14(2):3652–3674

    Article  Google Scholar 

  30. Soro S, Heinzelman W (2009) A survey of visual sensor networks. Advances in multimedia 2009:1–21

    Article  Google Scholar 

  31. Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683

    Article  Google Scholar 

  32. Wang H-S, Li Z-H, Lin R-W (2004) Maximum likelihood estimation for three-parameter Weibull distribution based on Wear out fault [J]. China Railway Science, 5

  33. Wu H-C, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings-Vision, Image and Signal Processing 152(5):611–615

    Article  Google Scholar 

  34. Wu H-T, Dugelay J-L, Shi Y-Q (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Processing Letters 22(1):81–85

    Article  Google Scholar 

  35. Yang F, Ren H, Hu Z (2019) Maximum likelihood estimation for three-parameter Weibull distribution using evolutionary strategy. Math Probl Eng, 2019

Download references

Acknowledgments

This work is partially supported by Artificial Intelligence and Data Analytics (AIDA) Lab CCIS Prince Sultan University Riyadh Saudi Arabia. The authors are thankful for the support.

Author information

Authors and Affiliations

Authors

Contributions

All the authors contributed equally.

Corresponding author

Correspondence to Amjad Rehman.

Ethics declarations

Conflicts of interest

All the authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, S., Abbas, N., Nasir, M. et al. Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT). Multimed Tools Appl 80, 17045–17065 (2021). https://doi.org/10.1007/s11042-020-09652-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09652-5

Keywords

Navigation