Skip to main content
Log in

Multi-image steganography and authentication using crypto-stego techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

It is a necessity to protect sensitive information in digital form from an adversary who may indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security systems designed to counter such attacks must keep abreast of the adversary. In this paper, we have proposed a novel multi-image crypto-stego technique using Rabin cryptosystem and Arnold transform that provides a mechanism to hide digital data in the form of text, image, audio, and video. The proposed technique is a novel approach for (n,n) secret sharing that prevents attack by an intruder impersonating as a shareholder. In the proposed technique, the header information is created to retrieve data in the correct order. Randomized encrypted data and partial header information are camouflaged in the edges of multiple images in an adaptive manner. Minimal and distribution sequence keys distribute data in shares. Experimental results yield high values of PSNR and low values of MSE for the audio, image, video signals. Further, as the entropy values for original cover image coincide with the crypto-stego image up to the third place of decimal, the secret message will go unnoticed. Sensitivity analysis reveals that even a minor variation in a single share makes the recovery of the secret message infeasible. Comparison with the state of the art techniques indicates that the proposed technique either scores over its competitors or performs equally well in terms of standard evaluation metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Notes

  1. a (mod n) is defined as set of all integers which have the same remainder as a when divided by n

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD thesis, University of Buckingham

  2. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile multimedia/image processing, security, and applications 2014, International society for optics and photonics, vol 9120, p 912005

  3. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17,799–17,823

    Article  Google Scholar 

  4. Abuturab MR (2012) Securing color information using arnold transform in gyrator transform domain. Opt Lasers Eng 50(5):772–779

    Article  Google Scholar 

  5. Agarwal A, Deshmukh M, Singh M (2020) Object detection framework to generate secret shares. Multimedia Tools and Applications 1–22

  6. AlKhodaidi T, Gutub A (2020) Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications 1–31

  7. Bai J, Chang CC, Nguyen TS, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42–51

    Article  Google Scholar 

  8. Balkrishan J, Singh AP (2016) Concealing data in a digital image with multilayer security. Multimed Tools Appl 75(12):7045–7063

    Article  Google Scholar 

  9. Buchmann J (1999) Introduction to cryptography. Springer, New York

    MATH  Google Scholar 

  10. Chang CC, Hsieh YP, Lin CH (2008a) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  11. Chang CC, Lin CC, Lin CH, Chen YH (2008b) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178 (11):2433–2447

    Article  Google Scholar 

  12. Chen CC, Wu WJ (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  13. Chen H, Du X, Liu Z, Yang C (2015) Optical color image hiding scheme by using gerchberg–saxton algorithm in fractional fourier domain. Opt Lasers Eng 66:144–151

    Article  Google Scholar 

  14. Chen L, Zhao D (2009) Color image encoding in dual fractional fourier-wavelet domain with random phases. Opt Commun 282(17):3433–3438

    Article  Google Scholar 

  15. Chien HY (2013) Combining rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low- end devices. Comput Netw 57(14):2705–2717

    Article  Google Scholar 

  16. Elia M, Schipani D (2013) On the rabin signature. J Discret Math Sci Cryptogr 16(6):367–378

    Article  MathSciNet  MATH  Google Scholar 

  17. Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581

    Article  MATH  Google Scholar 

  18. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Research 10(1):6

    Article  Google Scholar 

  19. Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391–402

    Article  Google Scholar 

  20. Hoffstein J, Pipher JC, Silverman JH, Silverman JH (2008) An introduction to mathematical cryptography. Springer, New York

    MATH  Google Scholar 

  21. Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36(7):1619–1629

    Article  Google Scholar 

  22. Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on boolean operations. J Inform Secur Appl 47:16–27

    Google Scholar 

  23. Kaya K, Selçuk AA (2007) Threshold cryptography based on Asmuth–Bloom secret sharing. Inform Sci 177(19):4148–4160

    Article  MathSciNet  MATH  Google Scholar 

  24. Kim C, Shin D, Leng L, Yang CN (2018a) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114

    Article  Google Scholar 

  25. Kim C, Shin D, Leng L, Yang CN (2018b) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79

    Article  Google Scholar 

  26. Kim C, Yang CN, Leng L (2020) High-capacity data hiding for abtc-eq based compressed image. Electronics 9(4):644

    Article  Google Scholar 

  27. Kurosawa K, Ogata W (1999) Efficient rabin-type digital signature scheme. Des Codes Crypt 16(1):53–64

    Article  MathSciNet  MATH  Google Scholar 

  28. Kurosawa K, Takagi T (2009) One-wayness equivalent to general factoring. IEEE Trans Inf Theory 55(9):4249–4262

    Article  MathSciNet  MATH  Google Scholar 

  29. Kurosawa K, Ito T, Takeuchi M (1988) Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number. Cryptologia 12(4):225–233

    Article  MathSciNet  MATH  Google Scholar 

  30. Leng L, Zhang J, Khan K, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in dct domain. Acad J 05:2543–2554

    Google Scholar 

  31. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354

    Article  Google Scholar 

  32. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features, ieee transactions on dependable and secure computing. IEEE Transactions on Dependable and Secure Computing

  33. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  34. Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887–1893

    Article  Google Scholar 

  35. Liu YX, Yang CN, Chou YS, Wu SY, Sun QD (2018) Progressive (k, n) secret image sharing scheme with meaningful shadow images by gemd and rgemd. J Vis Commun Image Represent 55:766–777

    Article  Google Scholar 

  36. Logeshwari R, Parvathy LR (2020) Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values. Multimedia Tools and Applications

  37. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inform Forens Secur 5(2):201–214

    Article  Google Scholar 

  38. Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22,023–22,043

    Article  Google Scholar 

  39. Menezes AJ, Katz J, Van oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    MATH  Google Scholar 

  40. Meng K, Miao F, Huang W, Xiong Y (2020) Threshold changeable secret sharing with secure secret reconstruction. Inform Process Lett 157:105,928

    Article  MathSciNet  MATH  Google Scholar 

  41. Mishra D, Sharma H, Sharma R, Kumar N (2017) A first cryptosystem for security of two-dimensional data. Fractals 25(01):1750,011

    Article  Google Scholar 

  42. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, New York, pp 1–12

  43. Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. Tech. rep. Massachusetts Inst of Tech Cambridge lab for computer science

  44. Sardar MK, Adhikari A (2020) Essential secret image sharing scheme with small and equal sized shadows. Signal Process Image Commun 87:115,923

    Article  Google Scholar 

  45. Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem-based rsa-threshold cryptography in MANET using verifiable secret sharing scheme. In: 2009 IEEE International conference on wireless and mobile computing, Networking and Communications. IEEE, pp 258–262

  46. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  47. Sun S (2016) A novel edge based image steganography with 2k correction and huffman encoding. Inf Process Lett 116(2):93–99

    Article  MATH  Google Scholar 

  48. Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-Int J Light Elect Opt 125(15):3972–3976

    Article  Google Scholar 

  49. Tripathi SK, Badiya S, Pandian KS, Gupta B, AlKhzaimi H (2020) Invertible secret sharing: Using meaningful shadows based on sorted indexed code. Optik 224:165,658

    Article  Google Scholar 

  50. Tsai DS, Horng G, Chen TH, Huang YT (2009) A novel secret image sharing scheme for true-color images with size constraint. Inf Sci 179(19):3247–3254

    Article  Google Scholar 

  51. Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82

    Article  Google Scholar 

  52. Wu X, Yang CN (2019) Invertible secret image sharing with steganography and authentication for ambtc compressed images. Signal Process Image Commun 78:437–447

    Article  Google Scholar 

  53. Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863

    Article  Google Scholar 

  54. Wu X, Yang CN, Yang YY (2020) Sharing and hiding a secret image in color palette images with authentication. Multimed Tools Appl 79 (35):25,657–25,677

    Article  Google Scholar 

  55. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  56. Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735

    Article  Google Scholar 

  57. Yang CN, Chen CH, Cai SR (2016) Enhanced boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Article  Google Scholar 

Download references

Acknowledgements

Authors thank the referees for their comments and suggestions which improved the presentation of the paper. Prof. R. K. Sharma is ConsenSys Blockchain Professor. He thanks ConsenSys AG for that previlage. This work has been supported for University of Delhi, Delhi-110007 with research grant RC/2015/9677.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himani Sharma.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, H., Mishra, D.C., Sharma, R.K. et al. Multi-image steganography and authentication using crypto-stego techniques. Multimed Tools Appl 80, 29067–29093 (2021). https://doi.org/10.1007/s11042-021-11068-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11068-8

Keywords

Navigation