Skip to main content

Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion

  • Conference paper
  • First Online:
Distributed Computing and Internet Technology (ICDCIT 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11319))

  • 1055 Accesses

Abstract

With the technological advancement, security of information has become a sensitive and alarming issue since it is highly susceptible to many dangerous threats and attacks. In this context, we propose a steganographic methodology which endows a number of conditional evaluations in order to facilitate encryption and masking of the data. The Extended Power Modulus Scrambling (PMS) technique provides an encryption mask to the cover. It ensures the generation of randomized swapping sequence based on the estimated conditions, thus intensifying the security level. A new Bit Mapping Insertion strategy is implemented next. This method implants the data bits within the encrypted cover medium (in this case, image). Furthermore, the reverse scrambling technique zips and covers up the private data. This procedure accredits high payload in conjunction with retaining the quality of the image. The evaluation is done against various benchmarking parameters, which establishes the imperceptibility theory corresponding to the generated output images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mukherjee, S., Sanyal, G.: Enhanced position power first mapping (PPFM) based image steganography. Int. J. of Comput. Appl. 39, 59–68 (2017)

    Google Scholar 

  2. Al-khasaaweneh, M.: Image encryption method based on using least square error techniques at the decryption stage. Int. J. Inf. Comput. Secur. 4(4), 332–344 (2011)

    Google Scholar 

  3. Sahoo, A., Tiwari, R.: A novel approach for hiding secret data in program files. Int. J. Inf. Comput. Secur. 8(1), 1–10 (2016)

    Google Scholar 

  4. Mukherjee, S., Ash, S., Sanyal, G.: A novel image steganographic methodology by power modulus scrambling with logistic mapping. In: IEEE Region 10th Conference on TENCON (2015)

    Google Scholar 

  5. Gayathri, J., Subashini, S.: A survey on security and efficiency issues in chaotic image encryption. Int. J. Inf. Comput. Secur. 8(4), 347–381 (2016)

    Google Scholar 

  6. Singh, K.: A survey on image steganography techniques. Int. J. Comput. Appl. 97, 10–20 (2014)

    Google Scholar 

  7. Gurav, J., et al.: High secured image by LSB steganography technique using matlab. Int. J. Recent Innov. Trends. Comput. Commun. 3(4), 1836–1840 (2015)

    Google Scholar 

  8. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5, 201–214 (2010)

    Article  Google Scholar 

  9. Kumar, A., Sharma, R.: A secure image steganography based on RSA algorithm and hash-LSB technique. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 363–372 (2012)

    Google Scholar 

  10. Gutub, A., Al-Qahtani, A., Tabakh, A.: Triple-A: secure RGB image steganography based on randomization. In: IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco, pp. 400–403 (2009)

    Google Scholar 

  11. Sanchetti, A.: Pixel value differencing image steganography using secret key. Int. J. Innov. Technol. Exploring Eng. 2, 2278–3075 (2012)

    Google Scholar 

  12. Mandal, J.K., et al.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. 2(4) (2012)

    Google Scholar 

  13. Khan, M., et al.: A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet. Inf. Syst. 9(5), 1938–1962 (2015)

    Google Scholar 

  14. Safarpour, M., Charmi, M.: Capacity enlargement of the PVD steganography method using the GLM technique. CoRR abs/1601.00299 (2016)

    Google Scholar 

  15. Ahmad, T., et al.: A survey on digital image steganography. In: The 7th International Conference on Information Technology (2015)

    Google Scholar 

  16. Mukherjee, S., Sanyal, G.: A novel image steganographic technique using Position Power First Mapping. In: IEEE International Conference on Research in Computational Intelligence and Communication Networks, pp. 406–410 (2015)

    Google Scholar 

  17. Almohammad, A., Ghinea, G.: Stego-image quality and the reliability of PSNR. In: Image Processing Theory, Tools and Applications. IEEE (2010)

    Google Scholar 

  18. Subhedar, M., Mankar, V.: Current status and key issues in image steganography: a survey. J. Comput. Sci. Rev. 13, 95–113 (2014)

    Article  Google Scholar 

  19. Reddy, V., Subramanyam, A., Reddy, P.: A novel technique for JPEG image steganography and its performance evaluation. IJAMC 5, 211–224 (2014)

    Article  Google Scholar 

  20. Koo, H., Cho, N.: Skew estimation of natural images based on a salient line detector. J. Electr. Imaging 22, 013020 (2013)

    Article  Google Scholar 

  21. Moon, S., Raut, R.: Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility. Int. J. Electr. Secur. Dig. Forensics 7(4), 305–329 (2015)

    Article  Google Scholar 

  22. Dukkipati, A.: On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl. Math. Comput. 218(23), 11674–11687 (2012)

    MathSciNet  MATH  Google Scholar 

  23. Duncan, K., Sarkar, S.: Relational entropy-based saliency detection in images and videos. In: 19th IEEE International Conference on Image Processing, pp. 1093–1096 (2012)

    Google Scholar 

  24. Mohapatra, S., et al.: Adaptive threshold selection for impulsive noise detection in images using coefficient of variance. Neural Comput. Appl. 21(2), 281–288 (2012)

    Article  MathSciNet  Google Scholar 

  25. Kasana, G., Singh, K., Bhatia, S.: Data hiding using lifting scheme and genetic algorithm. Int. J. Inf. Comput. Secur. 9(4), 271–287 (2017)

    Google Scholar 

  26. Mukherjee, S., Sanyal, G.: A chaos based image steganographic system. Multimed. Tools Appl. 77, 1–26 (2018)

    Article  Google Scholar 

  27. Banerjee, I., et al.: Hiding and analysis data in image using extended PMM. In: International Conference on Computational Intelligence: Modeling Techniques and Applications, pp. 157–166 (2013)

    Google Scholar 

  28. Yang, C., et al.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)

    Article  Google Scholar 

  29. Mahajan, M., Kaur, N.: Steganography in coloured images using wavelet domain-based saliency map. Int. J. Inf. Comput. Secur. 5(3), 224–235 (2013)

    Google Scholar 

  30. Ash, S., Mukherjee, S., Sanyal, G.: A DWT based steganographic method using prime first mapping. In: Advances in Computing and Communicational Engineering, pp. 471–476 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srilekha Mukherjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mukherjee, S., Sanyal, G. (2019). Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion. In: Fahrnberger, G., Gopinathan, S., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2019. Lecture Notes in Computer Science(), vol 11319. Springer, Cham. https://doi.org/10.1007/978-3-030-05366-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05366-6_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05365-9

  • Online ISBN: 978-3-030-05366-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics