Abstract
Image steganography is an extremely rich and significant exploration region that gives productive answers to some genuine and modern issues. This paper deals with secret image transmission and securing it from different attacks. The proposed image steganography technique uses a combination of image segmentation, pre-processing, and scrambling methos. The proposed technique begins with the segmentation of secret and cover images using Rubik’s cube. The segmentation process breaks the images into six parts, then after they are stored in a segmented image dataset. In the second step, each segmented secret image is processed by the image pre-processing method. The proposed image pre-processing method helps the system select the appropriate cover image from the segmented cover image dataset, which makes the technique more robust. In the third step, before the embedding process, secret images are scrambled using the proposed scrambling method. Finally, the cover and secret images are processed by discrete wavelet transforms (DWT) and singular value decomposition (SVD) to generate the stego image. The proposed technique is tested on a variety of grayscale images, with peak signal-to-noise ratio (PSNR) values ranging from 32.27 to 30.77 (dB) and structural similarity index measure (SSIM) values ranging from 0.93 to 0.90 for different alpha values. The extracted secret image is analyzed using normalized correlation (NC) and naturalness image quality evaluator (NIQE) parameters. The NC values are above 0.99, and the NIQE values ranged from 3.3264 to 3.8468 for various extracted images. To analyze the proposed technique, measured value of entropy and an elapse time are 7.7956 and 6.489 s, respectively. Comparative studies are conducted in four main areas. The first comparative study tested the reliability of the proposed scrambling method by calculating the overall and diagonal correlation values of the secret image and scrambled secret image. The second comparative study tested the impeccability and reliability of the stego image by comparing its PSNR value to other stego images produced by other researchers. The third comparative study tested the effect of false-positive tests on extracted secret images. The results showed that the extracted secret image could only be obtained from the original stego image, indicating that the proposed method was secure against false positives. The fourth or last comparative study compares the computational load of proposed technique with previously developed techniques. In general, the results of the comparative study show that the proposed technique is reliable and secure for image scrambling, stego image generation, and secret image extraction.
Similar content being viewed by others
Data availability
Data set used in this study is available at following link.
Kaggle data set:—https://www.kaggle.com/datasets/jyotikhandelwal/strengthening-dwt-svd-based-image-steganography
References
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: A review of the recent advances. IEEE Access 9:23409–23423
Qasim Ahmed Alyousuf F, Din R, Qasim AJ (2020) Analysis Review on spatial and transform domain technique in digital steganography. Bullet Electric Eng Inf 9(2). https://doi.org/10.11591/eei.v9i2.2068
Hussain M, Wahab AW, Idris YI, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012
Singh S, Siddiqui TJ (2018) Transform domain techniques for Image Steganography, Comput Vis, pp. 170–186, https://doi.org/10.4018/978-1-5225-5204-8.ch007
Kaur M, Kumar V (2018) A comprehensive review on Image Encryption Techniques. Archiv Comput Meth Eng 27(1):15–43
Zeng D-X, Li M, Wang J-J, Hou Y-L, Lu W-J, Huang Z (2018) Overview of Rubik’s cube and reflections on its application in mechanism, Chin J Mechan Eng, vol. 31, no. 1. https://doi.org/10.1186/s10033-018-0269-7
Zhao Y, Liu Y, Wang Y, Wei B, Yang J, Zhao Y, Wang Y (2016) Region-based saliency estimation for 3D shape analysis and understanding. Neurocomputing 197:1–13
Yosefnezhad Irani B, Ayubi P, Amani Jabalkandi F, Yousefi Valandar M, Jafari Barani M (2019) Digital Image Scrambling based on a new one-dimensional coupled sine map. Nonlin Dyn 97(4):2693–2721
Sivakumar T, Li P (2019) A secure image encryption method using scan pattern and random key stream derived from Laser Chaos. Opt Laser Technol 111:196–204
Tang Y, Shao Z, Zhao X, Shang Y (2021) Robust multiple color images encryption using discrete fourier transforms and chaotic map. Signal Process Image Commun 93:116168
Garg M, Ubhi JS, Aggarwal AK (2022) Neural style transfer for image steganography and destylization with supervised image to image translation. Multimed Tools Appl 82(4):6271–6288
Vidhya R, Brindha M (2022) A Chaos based image encryption algorithm using Rubik’s Cube and prime factorization process (CIERPF). J King Saud Univ Comput Inf Sci 34(5):2000–2016
Goudar RBRH, RB (2018) Secure Secret Image carrier using Rubiks Cube and Modified LSB. Int J Pure Appl Math 120:12111–12122
Helmy M, El-Rabaie E-SM, Eldokany IM, El-Samie FE (2017) 3-D image encryption based on Rubik’s Cube and RC6 algorithm, 3D Research, vol. 8, no. 4, https://doi.org/10.1007/s13319-017-0145-8
Abitha KA, Bharathan PK (2016) Secure Communication based on Rubik’s Cube algorithm and chaotic baker map. Procedia Technol 24:782–789
Aziz MM, Ahmed DR (2015) Simple Image Scrambling Algorithm Based on Random Numbers Generation. Int J Adv Res Comput Sci Softw Eng 5:434–438
Shao Z et al (2020) Double image encryption based on symmetry of 2D-DFT and equal modulus decomposition. Multimed Tools Appl 80(6):8973–8998
Shao Z et al (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process Image Commun 80:115662
Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on Rubik’s cube principle. J Electric Comput Eng 2012:1–13
Fan C, Chen M, Wang X, Wang J, Huang B (2021) A review on data preprocessing techniques toward efficient and reliable knowledge discovery from building operational data. Front Energy Res, vol. 9, https://doi.org/10.3389/fenrg.2021.652801
Sajasi S, Eftekhari Moghadam A-M (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389
Almohammad A, Ghinea G (2010) STEGO image quality and the reliability of PSNR, 2010 2nd International Conference on Image Processing Theory, Tools Appl
Wang J (2016) Digital Image Encryption algorithm design based on genetic Hyperchaos. Int J Opt 2016:1–14
Zaidan FK (2020) Digital Image Steganography scheme based on DWT and SVD. Diyala J Eng Sci 13(4):10–17
Liu J, Huang J, Luo Y, Cao L, Yang S, Wei D, Zhou R (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849–80860
Birajdar GK, Mankar VH (2017) Blind method for low-order interpolation detection in digital images. Aust J Forensic Sci 51(3):318–330
Rowayda A (2012) SVD based Image Processing Applications: State of the art, contributions and research challenges, Int J Adv Comput Sci Appl, vol. 3, no. 7, https://doi.org/10.14569/IJACSA.2012.030703
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Pan P, Wu Z, Yang C, Zhao B (2022) Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy 24(2):246
Wu L, Zhang X, Chen H, Wang D, Deng J (2021) VP-NIQE: An opinion-unaware visual perception natural image quality evaluator. Neurocomputing 463:17–28
Mondal B (2018) Cryptographic image scrambling techniques, Cryptograph Inf Secur, pp. 37–65, https://doi.org/10.1201/9780429435461-2
Ng K-H, Liew S-C, Ernawan F (2020) An improved RDWT-based image steganography scheme with QR decomposition and double entropy, Int J Adv Comput Sci Appl, vol. 11, no. 3, https://doi.org/10.14569/IJACSA.2020.0110327
Hillman P, Hannah J, Renshaw D (2001) Alpha Channel estimation in high resolution images and image sequences. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, pp 1063–1068. https://doi.org/10.1109/cvpr.2001.990648
Benoit A, Caplier A, Durette B, Herault J (2010) Using human visual system modeling for bio-inspired low level image processing. Comput Vis Image Underst 114(7):758–773
Sparavigna AC (2019) Entropy in image analysis. Entropy 21(5):502
Li T, Zhang Y, Wang S, Sun J (2021) High-Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. KSII Trans Internet Inf Syst 15(4):1521–1537
Vasudevan V, Ramakrishna M (2019) A hierarchical singular value decomposition algorithm for low rank matrices. arXiv 1710:1–8. https://doi.org/10.48550/arXiv.1710.02812
Epiphany JL, Sutha S, Danasingh AA (2013) An Analysis of Computational Complexity of Multiscale Image Representation Schemes. National Conference on Emerging Trends in Electrical and Electronics Engineering, University College of Engineering Panruti, Tamilnadu, India 1(1):1–5
Wang X-Y et al (2017) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243–6265
Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and Chaos. Signal Process 155:44–62
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of Interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Khandelwal, J., Sharma, V.K. Strengthening wavelet based image steganography using Rubik’s cube segmentation and secret image scrambling. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18576-3
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18576-3