Advertisement

Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion

  • Srilekha MukherjeeEmail author
  • Goutam Sanyal
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11319)

Abstract

With the technological advancement, security of information has become a sensitive and alarming issue since it is highly susceptible to many dangerous threats and attacks. In this context, we propose a steganographic methodology which endows a number of conditional evaluations in order to facilitate encryption and masking of the data. The Extended Power Modulus Scrambling (PMS) technique provides an encryption mask to the cover. It ensures the generation of randomized swapping sequence based on the estimated conditions, thus intensifying the security level. A new Bit Mapping Insertion strategy is implemented next. This method implants the data bits within the encrypted cover medium (in this case, image). Furthermore, the reverse scrambling technique zips and covers up the private data. This procedure accredits high payload in conjunction with retaining the quality of the image. The evaluation is done against various benchmarking parameters, which establishes the imperceptibility theory corresponding to the generated output images.

Keywords

Steganography Extended Power Modulus Scrambling (PMS) Peak Signal to Noise Ratio (PSNR) Structural Similarity Measure (SSIM) 

References

  1. 1.
    Mukherjee, S., Sanyal, G.: Enhanced position power first mapping (PPFM) based image steganography. Int. J. of Comput. Appl. 39, 59–68 (2017)Google Scholar
  2. 2.
    Al-khasaaweneh, M.: Image encryption method based on using least square error techniques at the decryption stage. Int. J. Inf. Comput. Secur. 4(4), 332–344 (2011)Google Scholar
  3. 3.
    Sahoo, A., Tiwari, R.: A novel approach for hiding secret data in program files. Int. J. Inf. Comput. Secur. 8(1), 1–10 (2016)Google Scholar
  4. 4.
    Mukherjee, S., Ash, S., Sanyal, G.: A novel image steganographic methodology by power modulus scrambling with logistic mapping. In: IEEE Region 10th Conference on TENCON (2015)Google Scholar
  5. 5.
    Gayathri, J., Subashini, S.: A survey on security and efficiency issues in chaotic image encryption. Int. J. Inf. Comput. Secur. 8(4), 347–381 (2016)Google Scholar
  6. 6.
    Singh, K.: A survey on image steganography techniques. Int. J. Comput. Appl. 97, 10–20 (2014)Google Scholar
  7. 7.
    Gurav, J., et al.: High secured image by LSB steganography technique using matlab. Int. J. Recent Innov. Trends. Comput. Commun. 3(4), 1836–1840 (2015)Google Scholar
  8. 8.
    Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5, 201–214 (2010)CrossRefGoogle Scholar
  9. 9.
    Kumar, A., Sharma, R.: A secure image steganography based on RSA algorithm and hash-LSB technique. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 363–372 (2012)Google Scholar
  10. 10.
    Gutub, A., Al-Qahtani, A., Tabakh, A.: Triple-A: secure RGB image steganography based on randomization. In: IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco, pp. 400–403 (2009)Google Scholar
  11. 11.
    Sanchetti, A.: Pixel value differencing image steganography using secret key. Int. J. Innov. Technol. Exploring Eng. 2, 2278–3075 (2012)Google Scholar
  12. 12.
    Mandal, J.K., et al.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. 2(4) (2012)Google Scholar
  13. 13.
    Khan, M., et al.: A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet. Inf. Syst. 9(5), 1938–1962 (2015)Google Scholar
  14. 14.
    Safarpour, M., Charmi, M.: Capacity enlargement of the PVD steganography method using the GLM technique. CoRR abs/1601.00299 (2016)Google Scholar
  15. 15.
    Ahmad, T., et al.: A survey on digital image steganography. In: The 7th International Conference on Information Technology (2015)Google Scholar
  16. 16.
    Mukherjee, S., Sanyal, G.: A novel image steganographic technique using Position Power First Mapping. In: IEEE International Conference on Research in Computational Intelligence and Communication Networks, pp. 406–410 (2015)Google Scholar
  17. 17.
    Almohammad, A., Ghinea, G.: Stego-image quality and the reliability of PSNR. In: Image Processing Theory, Tools and Applications. IEEE (2010)Google Scholar
  18. 18.
    Subhedar, M., Mankar, V.: Current status and key issues in image steganography: a survey. J. Comput. Sci. Rev. 13, 95–113 (2014)CrossRefGoogle Scholar
  19. 19.
    Reddy, V., Subramanyam, A., Reddy, P.: A novel technique for JPEG image steganography and its performance evaluation. IJAMC 5, 211–224 (2014)CrossRefGoogle Scholar
  20. 20.
    Koo, H., Cho, N.: Skew estimation of natural images based on a salient line detector. J. Electr. Imaging 22, 013020 (2013)CrossRefGoogle Scholar
  21. 21.
    Moon, S., Raut, R.: Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility. Int. J. Electr. Secur. Dig. Forensics 7(4), 305–329 (2015)CrossRefGoogle Scholar
  22. 22.
    Dukkipati, A.: On maximum entropy and minimum KL-divergence optimization by Gröbner basis methods. Appl. Math. Comput. 218(23), 11674–11687 (2012)MathSciNetzbMATHGoogle Scholar
  23. 23.
    Duncan, K., Sarkar, S.: Relational entropy-based saliency detection in images and videos. In: 19th IEEE International Conference on Image Processing, pp. 1093–1096 (2012)Google Scholar
  24. 24.
    Mohapatra, S., et al.: Adaptive threshold selection for impulsive noise detection in images using coefficient of variance. Neural Comput. Appl. 21(2), 281–288 (2012)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Kasana, G., Singh, K., Bhatia, S.: Data hiding using lifting scheme and genetic algorithm. Int. J. Inf. Comput. Secur. 9(4), 271–287 (2017)Google Scholar
  26. 26.
    Mukherjee, S., Sanyal, G.: A chaos based image steganographic system. Multimed. Tools Appl. 77, 1–26 (2018)CrossRefGoogle Scholar
  27. 27.
    Banerjee, I., et al.: Hiding and analysis data in image using extended PMM. In: International Conference on Computational Intelligence: Modeling Techniques and Applications, pp. 157–166 (2013)Google Scholar
  28. 28.
    Yang, C., et al.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)CrossRefGoogle Scholar
  29. 29.
    Mahajan, M., Kaur, N.: Steganography in coloured images using wavelet domain-based saliency map. Int. J. Inf. Comput. Secur. 5(3), 224–235 (2013)Google Scholar
  30. 30.
    Ash, S., Mukherjee, S., Sanyal, G.: A DWT based steganographic method using prime first mapping. In: Advances in Computing and Communicational Engineering, pp. 471–476 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of TechnologyDurgapurIndia

Personalised recommendations