Skip to main content
Log in

Strengthening wavelet based image steganography using Rubik’s cube segmentation and secret image scrambling

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image steganography is an extremely rich and significant exploration region that gives productive answers to some genuine and modern issues. This paper deals with secret image transmission and securing it from different attacks. The proposed image steganography technique uses a combination of image segmentation, pre-processing, and scrambling methos. The proposed technique begins with the segmentation of secret and cover images using Rubik’s cube. The segmentation process breaks the images into six parts, then after they are stored in a segmented image dataset. In the second step, each segmented secret image is processed by the image pre-processing method. The proposed image pre-processing method helps the system select the appropriate cover image from the segmented cover image dataset, which makes the technique more robust. In the third step, before the embedding process, secret images are scrambled using the proposed scrambling method. Finally, the cover and secret images are processed by discrete wavelet transforms (DWT) and singular value decomposition (SVD) to generate the stego image. The proposed technique is tested on a variety of grayscale images, with peak signal-to-noise ratio (PSNR) values ranging from 32.27 to 30.77 (dB) and structural similarity index measure (SSIM) values ranging from 0.93 to 0.90 for different alpha values. The extracted secret image is analyzed using normalized correlation (NC) and naturalness image quality evaluator (NIQE) parameters. The NC values are above 0.99, and the NIQE values ranged from 3.3264 to 3.8468 for various extracted images. To analyze the proposed technique, measured value of entropy and an elapse time are 7.7956 and 6.489 s, respectively. Comparative studies are conducted in four main areas. The first comparative study tested the reliability of the proposed scrambling method by calculating the overall and diagonal correlation values of the secret image and scrambled secret image. The second comparative study tested the impeccability and reliability of the stego image by comparing its PSNR value to other stego images produced by other researchers. The third comparative study tested the effect of false-positive tests on extracted secret images. The results showed that the extracted secret image could only be obtained from the original stego image, indicating that the proposed method was secure against false positives. The fourth or last comparative study compares the computational load of proposed technique with previously developed techniques. In general, the results of the comparative study show that the proposed technique is reliable and secure for image scrambling, stego image generation, and secret image extraction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data set used in this study is available at following link.

Kaggle data set:—https://www.kaggle.com/datasets/jyotikhandelwal/strengthening-dwt-svd-based-image-steganography

References

  1. Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: A review of the recent advances. IEEE Access 9:23409–23423

    Article  Google Scholar 

  2. Qasim Ahmed Alyousuf F, Din R, Qasim AJ (2020) Analysis Review on spatial and transform domain technique in digital steganography. Bullet Electric Eng Inf 9(2). https://doi.org/10.11591/eei.v9i2.2068

  3. Hussain M, Wahab AW, Idris YI, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012

    Article  Google Scholar 

  4. Singh S, Siddiqui TJ (2018) Transform domain techniques for Image Steganography, Comput Vis, pp. 170–186, https://doi.org/10.4018/978-1-5225-5204-8.ch007

  5. Kaur M, Kumar V (2018) A comprehensive review on Image Encryption Techniques. Archiv Comput Meth Eng 27(1):15–43

    Article  MathSciNet  Google Scholar 

  6. Zeng D-X, Li M, Wang J-J, Hou Y-L, Lu W-J, Huang Z (2018) Overview of Rubik’s cube and reflections on its application in mechanism, Chin J Mechan Eng, vol. 31, no. 1. https://doi.org/10.1186/s10033-018-0269-7

  7. Zhao Y, Liu Y, Wang Y, Wei B, Yang J, Zhao Y, Wang Y (2016) Region-based saliency estimation for 3D shape analysis and understanding. Neurocomputing 197:1–13

    Article  Google Scholar 

  8. Yosefnezhad Irani B, Ayubi P, Amani Jabalkandi F, Yousefi Valandar M, Jafari Barani M (2019) Digital Image Scrambling based on a new one-dimensional coupled sine map. Nonlin Dyn 97(4):2693–2721

    Article  Google Scholar 

  9. Sivakumar T, Li P (2019) A secure image encryption method using scan pattern and random key stream derived from Laser Chaos. Opt Laser Technol 111:196–204

    Article  ADS  Google Scholar 

  10. Tang Y, Shao Z, Zhao X, Shang Y (2021) Robust multiple color images encryption using discrete fourier transforms and chaotic map. Signal Process Image Commun 93:116168

    Article  Google Scholar 

  11. Garg M, Ubhi JS, Aggarwal AK (2022) Neural style transfer for image steganography and destylization with supervised image to image translation. Multimed Tools Appl 82(4):6271–6288

    Article  Google Scholar 

  12. Vidhya R, Brindha M (2022) A Chaos based image encryption algorithm using Rubik’s Cube and prime factorization process (CIERPF). J King Saud Univ Comput Inf Sci 34(5):2000–2016

    Google Scholar 

  13. Goudar RBRH, RB (2018) Secure Secret Image carrier using Rubiks Cube and Modified LSB. Int J Pure Appl Math 120:12111–12122

  14. Helmy M, El-Rabaie E-SM, Eldokany IM, El-Samie FE (2017) 3-D image encryption based on Rubik’s Cube and RC6 algorithm, 3D Research, vol. 8, no. 4, https://doi.org/10.1007/s13319-017-0145-8

  15. Abitha KA, Bharathan PK (2016) Secure Communication based on Rubik’s Cube algorithm and chaotic baker map. Procedia Technol 24:782–789

    Article  Google Scholar 

  16. Aziz MM, Ahmed DR (2015) Simple Image Scrambling Algorithm Based on Random Numbers Generation. Int J Adv Res Comput Sci Softw Eng 5:434–438

    Google Scholar 

  17. Shao Z et al (2020) Double image encryption based on symmetry of 2D-DFT and equal modulus decomposition. Multimed Tools Appl 80(6):8973–8998

    Article  Google Scholar 

  18. Shao Z et al (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process Image Commun 80:115662

    Article  Google Scholar 

  19. Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on Rubik’s cube principle. J Electric Comput Eng 2012:1–13

    Article  MathSciNet  Google Scholar 

  20. Fan C, Chen M, Wang X, Wang J, Huang B (2021) A review on data preprocessing techniques toward efficient and reliable knowledge discovery from building operational data. Front Energy Res, vol. 9, https://doi.org/10.3389/fenrg.2021.652801

  21. Sajasi S, Eftekhari Moghadam A-M (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389

    Article  Google Scholar 

  22. Almohammad A, Ghinea G (2010) STEGO image quality and the reliability of PSNR, 2010 2nd International Conference on Image Processing Theory, Tools Appl

  23. Wang J (2016) Digital Image Encryption algorithm design based on genetic Hyperchaos. Int J Opt 2016:1–14

    ADS  Google Scholar 

  24. Zaidan FK (2020) Digital Image Steganography scheme based on DWT and SVD. Diyala J Eng Sci 13(4):10–17

    Article  Google Scholar 

  25. Liu J, Huang J, Luo Y, Cao L, Yang S, Wei D, Zhou R (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849–80860

    Article  Google Scholar 

  26. Birajdar GK, Mankar VH (2017) Blind method for low-order interpolation detection in digital images. Aust J Forensic Sci 51(3):318–330

    Article  Google Scholar 

  27. Rowayda A (2012) SVD based Image Processing Applications: State of the art, contributions and research challenges, Int J Adv Comput Sci Appl, vol. 3, no. 7, https://doi.org/10.14569/IJACSA.2012.030703

  28. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  ADS  PubMed  Google Scholar 

  29. Pan P, Wu Z, Yang C, Zhao B (2022) Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy 24(2):246

    Article  ADS  MathSciNet  PubMed  PubMed Central  Google Scholar 

  30. Wu L, Zhang X, Chen H, Wang D, Deng J (2021) VP-NIQE: An opinion-unaware visual perception natural image quality evaluator. Neurocomputing 463:17–28

    Article  Google Scholar 

  31. Mondal B (2018) Cryptographic image scrambling techniques, Cryptograph Inf Secur, pp. 37–65, https://doi.org/10.1201/9780429435461-2

  32. Ng K-H, Liew S-C, Ernawan F (2020) An improved RDWT-based image steganography scheme with QR decomposition and double entropy, Int J Adv Comput Sci Appl, vol. 11, no. 3, https://doi.org/10.14569/IJACSA.2020.0110327

  33. Hillman P, Hannah J, Renshaw D (2001) Alpha Channel estimation in high resolution images and image sequences. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, pp 1063–1068. https://doi.org/10.1109/cvpr.2001.990648

  34. Benoit A, Caplier A, Durette B, Herault J (2010) Using human visual system modeling for bio-inspired low level image processing. Comput Vis Image Underst 114(7):758–773

    Article  Google Scholar 

  35. Sparavigna AC (2019) Entropy in image analysis. Entropy 21(5):502

    Article  ADS  MathSciNet  PubMed  PubMed Central  Google Scholar 

  36. Li T, Zhang Y, Wang S, Sun J (2021) High-Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. KSII Trans Internet Inf Syst 15(4):1521–1537

    ADS  Google Scholar 

  37. Vasudevan V, Ramakrishna M (2019) A hierarchical singular value decomposition algorithm for low rank matrices. arXiv 1710:1–8. https://doi.org/10.48550/arXiv.1710.02812

  38. Epiphany JL, Sutha S, Danasingh AA (2013) An Analysis of Computational Complexity of Multiscale Image Representation Schemes. National Conference on Emerging Trends in Electrical and Electronics Engineering, University College of Engineering Panruti, Tamilnadu, India 1(1):1–5

    Google Scholar 

  39. Wang X-Y et al (2017) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243–6265

    Article  Google Scholar 

  40. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and Chaos. Signal Process 155:44–62

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijay Kumar Sharma.

Ethics declarations

Conflicts of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khandelwal, J., Sharma, V.K. Strengthening wavelet based image steganography using Rubik’s cube segmentation and secret image scrambling. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18576-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18576-3

Keywords

Navigation