An Enhanced Robust and Protected Image Steganographic System

  • Abid Yahya


This chapter deals with two main aspects; the first one is concerned with introducing an improved robust and secure image steganography system. The original algorithm presented by Mali et al. gives adequate results in terms of robustness; however, the algorithm cannot be considered reliable, as some data is lost. In order to overcome the problem of the lost data due to the misidentified blocks, an embedding map was proposed to specify the location of the blocks that can be used for embedding a secret message. Such a technique, the embedding map, is very important if one needs to start the extracting phase correctly and accurately. Besides, any loss in the embedding map will in turn lead to data loss. Consequently, the embedding map will be hidden using SURF and DWT to assure robustness and to increase the level of security of the proposed system. The secret data can be embedded using the original algorithm (DCT-based) proposed by Mali et al. More so, the experimental results show the ability of the new algorithm, namely IRSS, to overcome the problem of losing data even with JPEG compression or Gaussian noise.


  1. Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.CrossRefGoogle Scholar
  2. Abdelwahab, A. A., & Hassaan, L. A. (2008, March 18–20). A discrete wavelet transform based technique for image data hiding. Paper presented at the radio science conference, 2008. NRSC 2008. National.Google Scholar
  3. Al-Jaber, A., & Aloqily, I. (2003). High quality steganography model with attacks detection. Information Technology Journal, 2, 116–127.CrossRefGoogle Scholar
  4. Areepongsa, S., Syed, Y. F., Kaewkamnerd, N., & Rao, K. R. (2000). Steganography for a low bit-rate wavelet based image coder. Paper presented at the image processing, 2000. Proceedings. 2000 International Conference on.Google Scholar
  5. Alattar, A. M. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13(8), 1147–1156.MathSciNetCrossRefGoogle Scholar
  6. Cover, K. S. (2006). Multiexponential reconstruction algorithm immune to false positive peak detection. Review of Scientific Instruments 77,075101 (2006); Scholar
  7. Cox, I., Miller, M., Bloom, J., & Honsinger, C. (2002). Digital Watermarking. Journal of Electronic Imaging, 11(3), 414–414.CrossRefGoogle Scholar
  8. Fallahpour, M., & Sedaaghi, M. H. (2007). High capacity lossless data hiding based on histogram modification. IEICE Electronics Express, 4(7), 205–210.CrossRefGoogle Scholar
  9. Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006a). Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine, 10(4), 722–732.CrossRefGoogle Scholar
  10. Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006b). Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44(8), 619–631.CrossRefGoogle Scholar
  11. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.Google Scholar
  12. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b, April). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st International Conference on Future Communication Network (ICFCN’12). IEEE international conference, Iraq, Baghdad.Google Scholar
  13. Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences, 7(1), 35–55.Google Scholar
  14. Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.Google Scholar
  15. Jun, T. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.CrossRefGoogle Scholar
  16. Kundur, D., & Hatzinakos, D. (1998). Towards a telltale watermarking technique for tamper-proofing. Image Processing, 1998. ICIP 98. Proceedings. Chicago, IL, USA, USA.Google Scholar
  17. Kundur, D., & Hatzinakos, D. (1999). Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE, 87(7), 1167–1180.CrossRefGoogle Scholar
  18. Lee, Y-K., & Chen, L-H. (2000). A secure robust image steganographic model. Paper presented at the tenth national conference of information security.Google Scholar
  19. Li, L., Qian, J., & Pan, J. S. (2011). Characteristic region based watermark embedding with RST invariance and high capacity. AEU - International Journal of Electronics and Communications, 65(5), 435–442.CrossRefGoogle Scholar
  20. Logeshwaran, R., & Paul, I. J. L. (2010, January). Performance study on the suitability of reed solomon codes in WiMAX. Paper presented at the wireless communication and sensor computing, 2010. International Conference on ICWCSC 2010.Google Scholar
  21. Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.MathSciNetCrossRefGoogle Scholar
  22. Malik, F., & Baharudin, B. (2013). The statistical quantized histogram texture features analysis for image retrieval based on median and laplacian filters in the DCT domain. International Arab Journal of Information Technology, 10(6), 1–9.Google Scholar
  23. Marvel, L. M., Boncelet Jr., C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075–1083.CrossRefGoogle Scholar
  24. Masakawa, T., & Ochiai, H. (2007, March). Design of reed-solomon codes for OFDM systems with clipping and filtering. Paper presented at the wireless communications and networking conference, 2007. WCNC 2007. IEEE.Google Scholar
  25. Morgari, G., Spicciola, M., Deantonio, S., & Elia, M. (2008). Steganographic schemes for noisy communication channels. Journal of Contemporary Engineering Sciences, 1(1), 27–39.Google Scholar
  26. Munuera, C. (2007). Steganography and error-correcting codes. Signal Processing, 87(6), 1528–1533.CrossRefGoogle Scholar
  27. Nayak, J., Bhat, P. S., Kumar, M. S., & Rajendra Acharya, U. (2004). Reliable transmission and storage of medical images with patient information using error control codes. India Annual Conference, 2004. Proceedings of the IEEE INDICON 2004, Kharagpur, India.Google Scholar
  28. Nayak, J., Subbanna Bhat, P., Acharya, U. R., & Sathish Kumar, M. (2009). Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems, 33(3), 163–171.CrossRefGoogle Scholar
  29. Reed, I. S., He, R., Chen, X., & Truong, T. K. (1998). Application of Grobner bases for decoding Reed-Solomon codes used on CDs. IEEE Proceedings – Computers and Digital Techniques, 145(6), 369–376.CrossRefGoogle Scholar
  30. Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300–304.MathSciNetCrossRefGoogle Scholar
  31. Singh, R. P., Khan, M. A. A., Khan, M., & Singh, N. (2010). Spread spectrum image steganography in multimedia messaging service of mobile phones. International Journal of Electronics Engineering, 2(2), 365–369.Google Scholar
  32. Smith, J. R., & Comiskey, B. O. (1996). Modulation and information hiding in images. Paper presented at the proceedings of the first international workshop on information hiding.CrossRefGoogle Scholar
  33. Vries, L. B., Immink, K. A., Nijboer, J. G., Hoeve, H., Philips, N. V., Doi, T. T., & Odaka, K. (1980). The compact disc digital audio system: Modulation and error correction. Paper presented at the 67th AES Convention, No. 1674(H-8).Google Scholar
  34. Zhang, W., & Li, S. (2005). Steganographic codes — a new problem of coding theory. Journal of Latex Class Files, 1(11), 7.Google Scholar
  35. Zhicheng, N., Yun-Qing, S., Ansari, N., & Wei, S. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Abid Yahya
    • 1
  1. 1.Faculty of Engineering & TechnologyBotswana International University of Science and TechnologyPalapyeBotswana

Personalised recommendations