Skip to main content
Log in

A new high capacity and secure image realization steganography based on ASCII code matching

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

This article has been updated

Abstract

Digital Steganography is the art of hiding secret messages behind an innocent looking digital media that do not raise suspicions. In this paper, a new proposed image realization steganography method is introduced which is a mapping-based method that hides in an unrevealed manner and without any change in the image cover file. The image cover is only used for referencing. The proposed method generates the cover-secret mapping that will realize the concealed secret message without embedding the real message. A mapping between the American Standard Code of Information Interchange (ASCII) codes of a secret message and an image is performed and the positions of the secret message in the image is noted in a position array. This reference positions are then sent to the receiver after first being compressed by Huffman algorithm and then encrypted using Advanced Encryption Standard with 128 bits key (AES-128). The position array and the cover image are transferred separately, so that the interception of any one file alone will not conceal any information. In addition, it has unlimited capacity as specific matching positions can be used more than once. Furthermore, the proposed method has a reduced size of position key and mapping table, hence having high-speed searching and matching compared to prevailing methods. Furthermore, several experimental tests have been applied to assess the efficiency and performance of the new proposed method to evaluate it according to the widely used metrics: Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). From the security point of view, Structural Similarity Index Measure (SSIM) together with Histogram have been performed. Moreover, it is critiqued showing its pros and cons and further compared with existing state-of-the-art research. The experimental results verified the efficacy of the new proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Change history

  • 02 January 2022

    The original version of this paper was updated to present the missing Supplementary file.

References

  1. Mukherjee S, Sanyal G (2019) A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. Multimedia Tools and Applications 78:17607–17622. https://doi.org/10.1007/s11042-018-7127-6

    Article  Google Scholar 

  2. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2019.2896270

  3. Swathi B, Shalini K, Prasanthi K (2012) A review on steganography using images. Asian Journal of Computer Science and Information Technology 2(8):234–237

    Google Scholar 

  4. Sadek M, Khalifa A, Mostafa M (2015) Video steganography: a comprehensive review. Multimedia Tools and Applications 74(17):7063–7094. https://doi.org/10.1007/s11042-014-1952-z

    Article  Google Scholar 

  5. Shelke FM, Dongre AA, Soni PD (2014) Comparison of different techniques for steganography in images. International Journal of Application or Innovation in Engineering & Management (IJAIEM) 3(2):171–176 (http://www.ijaiem.org)

    Google Scholar 

  6. Mohan AK (2015) Hybrid algorithm for improved RDH using dual imaging and histogram shifting, dissertation, In: Master of technology in electronics. department of electronics engineering, Pondicherry University Kalapet, Puducherry

  7. Elshoush HT, Ali IA, Mahmoud MM, Altigani A (2021) A novel approach to information hiding technique using ASCII mapping based image steganography. Journal of Information Hiding and Multimedia Signal Processing 12(2):65–82

    Google Scholar 

  8. Hamid N, Yahya A, Badlishah R, Al-Qershi O (2012) Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS) 6(3):168–187

    Google Scholar 

  9. Hmood AK, Zaidan BB, Zaidan AA, Jalab HA (2010) An overview on hiding information techniques in images. J Appl Sci 10(18)

  10. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Processing: Image Communication 58(2017):146–156

    Google Scholar 

  11. Abdulla AA, Sellahewa H, Jassim SA (2020) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: The proceeding of security standardization research - springer. arXiv:2004.12467

  12. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2(2):142–172

    Google Scholar 

  13. Fang D, Sun S (2018) A new scheme for image steganography based on hyperchaotic map and DNA sequence. Journal of Information Hiding and Multimedia Signal Processing 9(2):392–399

    Google Scholar 

  14. Kingsley KA, Barmawi AM (2020) Improving data hiding capacity in code based steganography using multiple embedding. Journal of Information Hiding and Multimedia Signal Processing 11(1):14–43

    Google Scholar 

  15. Zieliska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Communications of the ACM 57(3):86–95

    Google Scholar 

  16. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM System Journal 35(3/4):313–336

    Google Scholar 

  17. Kanzariya N, Nimavat A, Patel H (2013) Security of digital images using steganography techniques based on LSB, DCT and huffman encoding. In: Proceeding of international conference on advances in signal processing and communication - elsevier

  18. Kaur S, Kaur S (2010) A high security approach for image steganography by mapping pixels to letters. In: AIP conference proceedings 1324, 280. https://doi.org/10.1063/1.3526214 Published Online: 03 Dec 2010

  19. Kaur S, Kaur S, Kumar G (2011) An image steganography approach based upon matching. High performance architecture and grid computing (HPAGC 2011). Communications in Computer and Information Science, vol 169 Springer, Berlin

  20. Cheddad A, Condell J, Curran K, Kevitt P (2010) Digital image steganography-survey and analysis of current methods. Signal Processing 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  MATH  Google Scholar 

  21. Jayaram P, Ranganatha H, Anupama H (2011) Information hiding using audio steganography-a survey. International Journal of Multimedia and Its Applications (IJMA) 3(3):86–96

    Google Scholar 

  22. Maji G, Mandal S (2019) Secure and robust image steganography using a reference image as key. International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8(7):2278–3075

    Google Scholar 

  23. Nag A, Biswas S, Sarkar D, Sarkar PP (2010) A novel technique for image steganography based on Block-DCT and huffman encoding. Int J Comput Sci Inf Technol 2(3)

  24. Shete KS, Patil M and Chitode JS (2016) Least significant bit and discrete wavelet transform algorithm realization for image steganography employing FPGA, In: I.J. Image, graphics and signal processing, vol 6, pp 48–56, Published Online June 2016 in MECS (http://www.mecs-press.org/) https://doi.org/10.5815/ijigsp.2016.06.06

  25. Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24:1613–1626

    MATH  Google Scholar 

  26. Chang K-C, Chang C-P, Huang PS, Tu T-M (2008) A novel image steganographic method using tri-way pixel-value differencing. Journal Multimedia 3:37–44

    Google Scholar 

  27. Kim P-H, Yoon E-J, Ryu K-W, Jung K-H (2019) Data-hiding scheme using multidirectional pixel-value differencing on colour images. Hindawi - Security and Communication Networks, Volume 2019, Article ID 9038650, 11 pp. https://doi.org/10.1155/2019/9038650

  28. Geetha S, Kabilan V, Chockalingam S, Kamaraj N (2011) Varying radix numeral system based adaptive image steganography. Information Processing Letters 111(2011):792–797

    MathSciNet  MATH  Google Scholar 

  29. Dattaa B, Mukherjeeb U, Bandyopadhyaya SK (2016) LSB Layer independent robust steganography using binary addition. Proceeding of the International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85(2016):425–432

    Google Scholar 

  30. Tech JKM, Oberoi MA (2011) Image steganography by using mapping of letters to pixels and indicator channels. In: Proceeding of the international conference on advanced computing, communication and networks’11

  31. Hong Wien, Chen Taishi (2012) A novel data embedding method using adaptive pixel pair matching. Information Forensics and Security, IEEE Transactions 7:176–184. https://doi.org/10.1109/TIFS.2011.2155062

    Article  Google Scholar 

  32. Bhattacharyya S, Kumar L, Sanyal G (2010) A novel approach of data hiding using pixel mapping method (PMM). Int J Comput Sci Inf Security 1

  33. Bhattacharyya S, Khan A, Sanyal G (2011) Pixel mapping method (PMM) based bit plane complexity segmentation (bpcs) steganography. In: Proceedings of WICT 2011, Mumbai, India

  34. Bhattacharyya S, Sanyal G (2010) Hiding data in images using pixel mapping method (PMM). In: Proceedings of 9th annual conference on security and management (SAM) under the 2010 world congress in computer science, computer engineering, and applied computing(world comp 2010), LasVegas,USA, July 12-15

  35. Panjabi PK, Singh P (2013) An enhanced data hiding approach using pixel mapping method with optimal substitution approach. Int J Comput Appl (0975 – 8887) 74(10)

  36. Potdar V, Chang E (2004) Gray level modification steganography for secret communication. In: IEEE International conference on industrial informatics, Berlin, Germany, pp 355–368

  37. Saad AHS, Mohamed MS, Hafez EH (2021) Coverless image steganography based on jigsaw puzzle image generation. Comput Mater Continua. https://doi.org/10.32604/cmc.2021.015329

  38. Bilal M, Imtiaz S, Abdul W et al (2014) Chaos based zero-steganography algorithm. Multimedia Tools Applications 72:1073–1092. https://doi.org/10.1007/s11042-013-1415-y

    Article  Google Scholar 

  39. Chen X, Qiu A, Sun X, Wang S, Wei G (2019) A high-capacity coverless image steganography method based on double-level index and block matching. Mathematical Biosciences and Engineering (MBE) 16(5):4708–4722

    Google Scholar 

  40. Zhou Z, Sun H, Harit R, Chen X, Sun X (2015) Coverless Image Steganography Without Embedding, In: Huang Z, Sun X, Luo J, Wang J (eds) Cloud computing and security. ICCCS 2015. lecture notes in computer science, vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7-11

  41. Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless Information Hiding Based on the Molecular Structure Images of Material. Tech Science Press - CMC 54(2):197–207

    Google Scholar 

  42. Cao Y, Zhou Z, Yang C, Sun X (2018) Dynamic content selection framework applied to coverless information hiding. Journal of Internet Technology 19(4):1179–86

    Google Scholar 

  43. Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia Tools and Applications 78:7965–7980

    Google Scholar 

  44. Yang L, Deng H, Dang X (2016) A novel coverless information hiding method based on the most significant bit of the cover image. IEEE Access 4

  45. Wu J, Liu Y, Dai Z, Kang Z, Rahbar S, Jia Y (2019) A coverless information hiding algorithm based on grayscale gradient co-occurrence matrix. IETE Technical Review 4602:22–33. https://doi.org/10.1080/02564602.2018.1531735

    Article  Google Scholar 

  46. Zheng S, Wang L, Ling B, Hu D (2017) Coverless information hiding based on robust image hashing, ICIC 2017. ICIC 2017, Part III, LNAI 10363:536–547

    Google Scholar 

  47. Liu Q, Xiang X, Qin J, Tan Y, Zhang Q (2021) Reversible sub-feature retrieval: Toward robust coverless image steganography for geometric attacks resistance. SII Trans Internet Inf Syst 15(3)

  48. ShuangKui X, Wu J (2018) A modification-free steganography method based on image information entropy. Hindawi - Security and Communication Networks, Vol 2018, Article ID 6256872, 8 https://doi.org/10.1155/2018/6256872

  49. Saad AHS, Mohamed MS, Hafez EH (2021) Coverless image steganography based on optical mark recognition and machine learning. IEEE Access 9:16522–16531

    Google Scholar 

  50. Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univ. Press, Cambridge, U.K

    MATH  Google Scholar 

  51. Liu Q, Xiang X, Qin J, Tan Y, Qiu Y (2020) Coverless image steganography based on densenet feature mapping open access. EURASIP Journal on Image and Video Processing 2020:39

    Google Scholar 

  52. Sandoval-Brav LA, Ponomaryov VI, Reyes-Reyes R, Cruz-Ramos C (2020) Coverless image steganography framework using distance local binary pattern and convolutional neural network. In: Proc. SPIE 11401, real-time image processing and deep learning 2020, 114010D (22 April 2020). https://doi.org/10.1117/12.2556310

  53. Qiu A, Chen X, Sun X, Wang S, Wei G (2019) Coverless image steganography method based on feature selection. Journal of Information Hiding and Privacy Protection (JIHPP) 1(2):49–60

    Google Scholar 

  54. Zhou Z, Cao Y, Wang M, Fan E, Wu QMJ (2019) Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access 7:179891–179897

    Google Scholar 

  55. Qin J, Wang J, Tan Y, Huang H, Xiang X, He Z (2020) overless image steganography based on generative adversarial network. Mathematics 2020, MPDI 8:1394. https://doi.org/10.3390/math8091394

    Article  Google Scholar 

  56. Cao Y, Zhou Z, Wu QMJ, Yuan C (2020) Sun X (2020) Coverless information hiding based on the generation of anime characters. EURASIP Journal on Image and Video Processing 2020:36

    Google Scholar 

  57. Zhang S, Su S, Li L, Zhou Q, Lu J, Chang C-C (2019) An image style transfer network using multilevel noise encoding and its application in coverless steganography. Symmetry, MPDI 11:1152. https://doi.org/10.3390/sym11091152

    Article  Google Scholar 

  58. Santoso KN, Suk-Hwan L, Hwang W-J, Ki-Ryong K (2015) Information hiding in noncoding DNA for DNA steganography. IEICE Trans Fundam Electron Commun Comput Sci 98(2015):1529–1536

    Google Scholar 

  59. Husainy MAFA (2009) Image steganography by mapping pixels to letters. Journal of Computer Science 5(1):33–38 (ISSN 1549-3636)

    Google Scholar 

  60. Challita K, Farhat H (2011) Combining steganography and cryptography: new directions. International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1):199–208

    Google Scholar 

  61. Alamsyah MAM, Prasetiyo B (2015) Data hiding security using bit matching-based steganography and cryptography without change the stego image quality. J Theor Appl Inf Technol 10th 82(1)

  62. Anitha S, Ramaprabha T (2020) Using reference image an alternative approach of steganography. In: International journal of engineering research & technology (IJERT), ISSN: 2278-0181 ICATCT – 2020 conference proceedings

  63. Bandyopadhyay SK, Maitra IK (2010) An alternative approach of steganography using reference image. Int J Adv Technol 1(1). http://ijict.org/ (ISSN 0976-4860)

  64. Umamaheswari G, Sumathi CP (2017) A new information hiding technique matching secret message and cover image binary value. Int J Comput Sci Inf Security (IJCSIS)15(1)

  65. Alsarayreh MA, Alia MA, Maria KA (2017) A novel image steganographic system based on exact matching algorithm and key-dependent data technique. Journal of Theoretical and Applied Information Technology 95(5):1212

    Google Scholar 

  66. Hussein HL, Abbass AA, Naji SA, Al-augby S, Lafta JH (2018) Hiding text in gray image using mapping technique. In: IOP conference series: journal of physics: conference series 1003 (2018) 012032, https://doi.org/10.1088/1742-6596/1003/1/012032

  67. Abbass AA, Al-Augby S, Hussein HL, Hussein J, Tornai R (2021) ASCII mapping technique for text hiding in the RGB and gray images. Journal of Engineering and Applied Sciences 16(4):161–165 (ISSN: 1816-949x)

    Google Scholar 

  68. Al-Husainy MAF (2011) A new image steganography based on decimal-digits representation. Comput Inf Sci 4(6)

  69. Akara F, Varol HS (2004) New RGB weighted encoding technique for efficient information hiding in images. J Naval Sci Eng 2(2)

  70. ASCII code website (2018) http://www.ascii-code.com

  71. Johnson N, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34

    Google Scholar 

  72. Image structure (2018) http://jun.hansung.ac.kr/DI/Chapter-2.htm

  73. Singh S, Agarwal G (2010) Use of image to secure text message with the help of LSB replacement. International Journal of Applied Engineering Research, Dindigul 1(1):200–205

    Google Scholar 

  74. Laskar SA, Hemachandran K (2012) High capacity data hiding using LSB steganography and encryption. Int J Database Manag Syst (IJDMS) 4(6)

  75. Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65. https://doi.org/10.1016/j.image.2018.03.012

  76. Banerjee I, Bhattacharyya S, Sanyal G (2013) Hiding & analyzing data in image using extended PMM. Procedia Technology 10:157–166

    Google Scholar 

  77. Bhattacharyya S, Khan A, Banerjee I, Sanyal G (2014) A robust image steganography method using PMM in bit plane domain. World Academy of Sci Eng Technol Int J Comput Electr Autom Control Inf Eng 8(9)

  78. Bhattacharyya S, Sanyal G (2010) A data hiding model with high security features combining finite state machines and pmm method. World Academy of Science, Engineering and Technology 68:409–416

    Google Scholar 

  79. Halidou A, Mohamadou Y, Georges Delort Olle O (2017) Robust Steganography based on Matching Pixel Locations. International Journal of Computer Applications 168(12):0975–8887

    Google Scholar 

  80. Ali AA, Saad AS (2013) New Image Steganography Method By Matching Secret Message With Pixels Of Cover Image (SMM). International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR). 3(2):1–10 (ISSN 2249-6831)

    MathSciNet  Google Scholar 

  81. Al-Taani AT, AL-Issa AM (2009) A novel steganographic method for gray-level images. World Acad Sci Eng Technol 27

  82. Singh S, Singh P, Garg R, Mishra PK (2013) Some observations of image steganography on implementation of least significant bit technique with mapping method. International Journal of Advanced Research in IT and Engineering (IJARIE) 2(2):97–105 (ISSN: 2278-6244)

    Google Scholar 

  83. Roy R, Changder S (2014) Image realization steganography with LCS based mapping. In: The proceeding of 2014 seventh international conference on contemporary computing (IC3) - IEEE, pp 218–223. https://doi.org/10.1109/IC3.2014.6897176

  84. Roy R, Samima S, Changder S (2015) A map-based image steganography scheme for RGB images. International Journal of Information and Computer Security 7(2-4) 196–215. Inderscience Publishers (IEL). https://doi.org/10.1504/IJICS.2015.073026

  85. Samima S, Roy R, Changder S (2013) Secure key based image realization steganography. In: The proceedings of 2013 IEEE second international conference on image information processing (ICIIP-2013), pp 377–382

  86. Bhattacharyya S, Indu P, Sanyal G (2013) Hiding data in text using ASCII mappingtechnology (AMT). International Journal of Computer Applications, (0975 –8887) 70(18):29–37

    Google Scholar 

  87. Sharma V, Kumar S (2013) A new approach to hide text in images using steganography. International Journal of Advanced Research in Computer Science and Software Engineering 3(4):701–708

    Google Scholar 

  88. Joshi K (2018) A new approach of text steganography using ASCII values. Int J Eng Res Technol (IJERT) 7(05) (ISSN: 2278-0181)

  89. Husainy MAFA (2010) A novel steganography-cryptography system. In: Proceedings of the world congress on engineering and computer science, Vol I WCECS 2010, October 20-22, 2010, San Francisco, USA

Download references

Acknowledgements

All the authors have substantially contributed to the work and declare that they have no conflict of interest. Also, the research has not received any specific grant from any funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huwaida T. Elshoush.

Supplementary Information

Below is the link to the electronic supplementary material.

(MP4 105 MB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elshoush, H.T., Mahmoud, M.M. & Altigani, A. A new high capacity and secure image realization steganography based on ASCII code matching. Multimed Tools Appl 81, 5191–5237 (2022). https://doi.org/10.1007/s11042-021-11741-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11741-y

Keywords

Navigation