Abstract
The internet's global data communication has made data transfer both simple and dangerous. The security of data transferred over the Internet is a major concern nowadays. Steganography is a popular method for preventing unauthorized access to data. This paper proposes a three-level secured hybrid image steganography method with increased payload by embedding secret data bits in both the spectral and spatial domains. First, the cover and secret image are encrypted using the permutation order (PO) generated by the initial keys (First Level security), and then the cover image is converted using DCT and random DCT blocks are selected using key values to embed the secret data (Second Level security). Finally, the remaining secret data bits are embedded at random locations specified by the key values in the LSB planes (Third Level security). The method achieves a PSNR of 35.86 dB and a hiding ratio of 50% (4bpp), according to the performance results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ranjithkumar, R., Ganeshkumar, D., Senthamilarasu, S.: Efficient and secure data hiding in video sequence with three-layer security: an approach using chaos. Multimed Tools Appl., 80, 13865–13878 (2021)
Saidi, M., Hermassi, H., Rhouma, R., Belghith, S.: A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl. 76(11), 13493–13510 (2016). https://doi.org/10.1007/s11042-016-3722-6
Ranjith Kumar, R., Jayasudha, S., Pradeep, S.: Efficient and secure data hiding in encrypted images: a new approach using chaos. Inf. Secur. J. Glob. Perspect. 25(4–6), 235–246 (2016). https://doi.org/10.1080/19393555.2016.1248582
Patel, R., Lad, K., Patel, M.: Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis. Int. J. Inf. Technol. 14, 1649–1657 (2022). https://doi.org/10.1007/s41870-021-00788-7
Kaur, R., Singh, B.: A hybrid algorithm for robust image steganography. Multidimens. Syst. Signal Process. (2020). https://doi.org/10.1007/s11045-020-00725-0
Sharif, A., Mollaeefar, M., Nazari, M.: A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools Appl. 76(6), 7849–7867 (2016). https://doi.org/10.1007/s11042-016-3398-y
Valandar, M.Y., Barani, M.J., Ayubi, P., Aghazadeh, M.: An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools Appl. 78(8), 9971–9989 (2018). https://doi.org/10.1007/s11042-018-6584-2
Parah, S.A., Sheikh, J.A., Assad, U.I., Bhat, G.M.: Hiding in encrypted images: a three tier security data hiding technique. Multidimension. Syst. Signal Process. 28(2), 549–572 (2015). https://doi.org/10.1007/s11045-015-0358-z
Gajabe, R., Ali, S.T.: Secret key-based image steganography in spatial domain Int. J. Image Graph. 22(02). https://doi.org/10.1142/S0219467822500140
Thiyagarajan, P., Natarajan, V., Aghila, G., et al.: Pattern based 3D image Steganography. 3D Res. 4, 1 (2013). https://doi.org/10.1007/3DRes.01(2013)1
Zhou, R.-G., Luo, J., Liu, X., Zhu, C., Wei, L., Zhang, X.: A novel quantum image steganography scheme based on LSB. Int. J. Theor. Phys. 57(6), 1848–1863 (2018). https://doi.org/10.1007/s10773-018-3710-x
Miri, A., Faez, K.: An image steganography method based on integer wavelet transform. Multimedia Tools Appl. 77(11), 13133–13144 (2017). https://doi.org/10.1007/s11042-017-4935-z
AbdelRaouf, A.: A new data hiding approach for image steganography based on visual color sensitivity. Multimedia Tools Appl. 80(15), 23393–23417 (2021). https://doi.org/10.1007/s11042-020-10224-w
Hussain, M., Riaz, Q., Saleem, S., Ghafoor, A., Jung, K.-H.: Enhanced adaptive data hiding method using LSB and pixel value differencing. Multimedia Tools Appl. 80(13), 20381–20401 (2021). https://doi.org/10.1007/s11042-021-10652-2
Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to Steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9, 1966–1974 (2018). https://doi.org/10.1016/j.asej.2017.02.003
Siddiqui, T.J., Khare, A.: Chaos-based video steganography method in discrete cosine transform domain. Int. J. Image Graph. (2020). https://doi.org/10.1142/s0219467821500157
Alipour, M.C., Gerardo, B.D., Medina, R.P.:Â LSB substitution image steganography based on randomized pixel selection and one-time pad encryption. In: 2020 2nd International Conference on Big-Data Service and Intelligent Computation (2020). https://doi.org/10.1145/3440054.3440055
The USC-SIPI Image Database. http://sipi.usc.edu/database. Accessed 12 June 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kumar, D., Sudha, V.K. (2023). A Hybrid Image Steganography Method Based on Spectral and Spatial Domain with High Hiding Ratio. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 715. Springer, Cham. https://doi.org/10.1007/978-3-031-35507-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-35507-3_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35506-6
Online ISBN: 978-3-031-35507-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)