Abstract
It is a necessity to protect sensitive information in digital form from an adversary who may indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security systems designed to counter such attacks must keep abreast of the adversary. In this paper, we have proposed a novel multi-image crypto-stego technique using Rabin cryptosystem and Arnold transform that provides a mechanism to hide digital data in the form of text, image, audio, and video. The proposed technique is a novel approach for (n,n) secret sharing that prevents attack by an intruder impersonating as a shareholder. In the proposed technique, the header information is created to retrieve data in the correct order. Randomized encrypted data and partial header information are camouflaged in the edges of multiple images in an adaptive manner. Minimal and distribution sequence keys distribute data in shares. Experimental results yield high values of PSNR and low values of MSE for the audio, image, video signals. Further, as the entropy values for original cover image coincide with the crypto-stego image up to the third place of decimal, the secret message will go unnoticed. Sensitivity analysis reveals that even a minor variation in a single share makes the recovery of the secret message infeasible. Comparison with the state of the art techniques indicates that the proposed technique either scores over its competitors or performs equally well in terms of standard evaluation metrics.
Similar content being viewed by others
Notes
a (mod n) is defined as set of all integers which have the same remainder as a when divided by n
References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD thesis, University of Buckingham
Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile multimedia/image processing, security, and applications 2014, International society for optics and photonics, vol 9120, p 912005
Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17,799–17,823
Abuturab MR (2012) Securing color information using arnold transform in gyrator transform domain. Opt Lasers Eng 50(5):772–779
Agarwal A, Deshmukh M, Singh M (2020) Object detection framework to generate secret shares. Multimedia Tools and Applications 1–22
AlKhodaidi T, Gutub A (2020) Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications 1–31
Bai J, Chang CC, Nguyen TS, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42–51
Balkrishan J, Singh AP (2016) Concealing data in a digital image with multilayer security. Multimed Tools Appl 75(12):7045–7063
Buchmann J (1999) Introduction to cryptography. Springer, New York
Chang CC, Hsieh YP, Lin CH (2008a) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Chang CC, Lin CC, Lin CH, Chen YH (2008b) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178 (11):2433–2447
Chen CC, Wu WJ (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen H, Du X, Liu Z, Yang C (2015) Optical color image hiding scheme by using gerchberg–saxton algorithm in fractional fourier domain. Opt Lasers Eng 66:144–151
Chen L, Zhao D (2009) Color image encoding in dual fractional fourier-wavelet domain with random phases. Opt Commun 282(17):3433–3438
Chien HY (2013) Combining rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low- end devices. Comput Netw 57(14):2705–2717
Elia M, Schipani D (2013) On the rabin signature. J Discret Math Sci Cryptogr 16(6):367–378
Feng JB, Wu HC, Tsai CS, Chang YF, Chu YP (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Research 10(1):6
Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391–402
Hoffstein J, Pipher JC, Silverman JH, Silverman JH (2008) An introduction to mathematical cryptography. Springer, New York
Hou YC (2003) Visual cryptography for color images. Pattern Recognit 36(7):1619–1629
Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on boolean operations. J Inform Secur Appl 47:16–27
Kaya K, Selçuk AA (2007) Threshold cryptography based on Asmuth–Bloom secret sharing. Inform Sci 177(19):4148–4160
Kim C, Shin D, Leng L, Yang CN (2018a) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114
Kim C, Shin D, Leng L, Yang CN (2018b) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79
Kim C, Yang CN, Leng L (2020) High-capacity data hiding for abtc-eq based compressed image. Electronics 9(4):644
Kurosawa K, Ogata W (1999) Efficient rabin-type digital signature scheme. Des Codes Crypt 16(1):53–64
Kurosawa K, Takagi T (2009) One-wayness equivalent to general factoring. IEEE Trans Inf Theory 55(9):4249–4262
Kurosawa K, Ito T, Takeuchi M (1988) Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number. Cryptologia 12(4):225–233
Leng L, Zhang J, Khan K, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in dct domain. Acad J 05:2543–2554
Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354
Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features, ieee transactions on dependable and secure computing. IEEE Transactions on Dependable and Secure Computing
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887–1893
Liu YX, Yang CN, Chou YS, Wu SY, Sun QD (2018) Progressive (k, n) secret image sharing scheme with meaningful shadow images by gemd and rgemd. J Vis Commun Image Represent 55:766–777
Logeshwari R, Parvathy LR (2020) Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values. Multimedia Tools and Applications
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inform Forens Secur 5(2):201–214
Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22,023–22,043
Menezes AJ, Katz J, Van oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Meng K, Miao F, Huang W, Xiong Y (2020) Threshold changeable secret sharing with secure secret reconstruction. Inform Process Lett 157:105,928
Mishra D, Sharma H, Sharma R, Kumar N (2017) A first cryptosystem for security of two-dimensional data. Fractals 25(01):1750,011
Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, New York, pp 1–12
Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. Tech. rep. Massachusetts Inst of Tech Cambridge lab for computer science
Sardar MK, Adhikari A (2020) Essential secret image sharing scheme with small and equal sized shadows. Signal Process Image Commun 87:115,923
Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem-based rsa-threshold cryptography in MANET using verifiable secret sharing scheme. In: 2009 IEEE International conference on wireless and mobile computing, Networking and Communications. IEEE, pp 258–262
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Sun S (2016) A novel edge based image steganography with 2k correction and huffman encoding. Inf Process Lett 116(2):93–99
Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-Int J Light Elect Opt 125(15):3972–3976
Tripathi SK, Badiya S, Pandian KS, Gupta B, AlKhzaimi H (2020) Invertible secret sharing: Using meaningful shadows based on sorted indexed code. Optik 224:165,658
Tsai DS, Horng G, Chen TH, Huang YT (2009) A novel secret image sharing scheme for true-color images with size constraint. Inf Sci 179(19):3247–3254
Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82
Wu X, Yang CN (2019) Invertible secret image sharing with steganography and authentication for ambtc compressed images. Signal Process Image Commun 78:437–447
Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852–1863
Wu X, Yang CN, Yang YY (2020) Sharing and hiding a secret image in color palette images with authentication. Multimed Tools Appl 79 (35):25,657–25,677
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735
Yang CN, Chen CH, Cai SR (2016) Enhanced boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Acknowledgements
Authors thank the referees for their comments and suggestions which improved the presentation of the paper. Prof. R. K. Sharma is ConsenSys Blockchain Professor. He thanks ConsenSys AG for that previlage. This work has been supported for University of Delhi, Delhi-110007 with research grant RC/2015/9677.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sharma, H., Mishra, D.C., Sharma, R.K. et al. Multi-image steganography and authentication using crypto-stego techniques. Multimed Tools Appl 80, 29067–29093 (2021). https://doi.org/10.1007/s11042-021-11068-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11068-8