Abstract
After the tremendous development and fast growth in communication systems and electronic devices, information security and preservation have become one of the most important procedures to be considered when transferring data between two parties. Encryption and data hiding are two of the most important techniques to protect the information sent over networks and the Internet. In this paper, a new technique of encryption and concealment is used through the following steps: First, the secret information is encrypted by using developed DNA to get (S1), second, by scrambling the encrypted data, the (S1) is diffused by using a zigzag method to get (S2), third, re-obfuscation the (S2) by using developed zigzag method through using Tinkerbell technique to get (S3), fourth, perform XoR operation between the (S3) and the Tinkerbell technique to get (S4), and fifth, the (S4) is hidden in the random locations of the cover image based on the LSB technique and the Tinkerbell technology, where the Tinkerbell has incredibly excellent characteristics and used to generate random sequence numbers twice with different initial and parameters value, once for the encryption process for scrambling secret information and once for the hiding process for determining hidden locations. Several metrics were used to evaluate the system's efficiency: histogram, PSNR, MSE, mean absolute error, bit error rate, encryption quality, Unified Average Changing Intensity, hamming distance, entropy, and correlation coefficient. The experimental results display that the suggested method has a good performance and reliability, high security, and greater embedding capacity and ensures higher image quality; also, the proposed method presented preferable outcomes when compared to other approaches.










Similar content being viewed by others
Data availability
The datasets generated during the current study are available in the USC-SIPI image database (available for free at http://sipi.usc.edu/database/).
References
Abdulhammed OY (2022) A novel approach of steganography by using strong edge detection and chaos theory. Multimedia Tools Appl. https://doi.org/10.1007/s11042-022-12643-3
El-Khamy SE, KoranylEl-Sherif NOMH (2016) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimedia Tools Appl. https://doi.org/10.1007/s11042-016-4113-8
Abdulhammed OY (2022) SFO for enhancing steganography by exploiting exact resemblance between cover and secure text. Acta Sci Technol. https://doi.org/10.4025/actascitechnol.v44i1.57581
Karim AB, Abdalqader PS, Najim ZT, Salhd AM, Abdulhammed OY (2021) Color image encryption with a novel technique and chaotic singer map. Sci J Univ Zakho. https://doi.org/10.25271/sjuoz.2021.9.3.316
Abdulhammed OY (2020) strengthening steganography by using crow search algorithm of fingerprint image. East-Eur J Enterpr Technol. https://doi.org/10.15587/1729-4061.2020.200282
Talee GT, Jelmeran MJ, Mohammed SJ (2014) A new approach for chaotic encrypted data hiding in color image. Int J Comput Appl. https://doi.org/10.5120/15006-3233
Kekre HB, Athawale A, Rao S, Athawale U (2010) Information hiding in audio signals. Int J Comput Appl 7(9):14–19
Vanmathi C, Prabu S (2017) Image steganography using fuzzy logic and chaotic for large payload and high imperceptibility. Int J Fuzzy Syst. https://doi.org/10.1007/s40815-017-0420-0
Pareek NK, Vinod P, Sud (2006) Image encryption using chaotic. logistic map. Image Vis Comput. https://doi.org/10.1016/j.imavis.2006.02.021
Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Priv Trust Manag. https://doi.org/10.5121/ijsptm.2014.3102
Hanchinamani G, Kulakarni L (2014) A novel approach for image encryption based on parametric mixing chaotic system. Int J Comput Appl. https://doi.org/10.5120/16839-6690
Goldsztejn A, Hayes W, Collins P (2011) Tinkerbell Is Chaotic siam j. Appl Dyn Syst. https://doi.org/10.1137/100819011
Al-Shara IM, Al-Ftlawy DM (2013) The dynamics of the 2-d piecewise tinkerbell map. Mathematical theory and modeling.
Yildirim M (2021) Steganography-based voice hiding in medical images of COVID-19 patients. Nonlinear Dyn. https://doi.org/10.1007/s11071-021-06700-z
Wang Y, Tang M, Wang Z (2020) High-capacity adaptive steganography based on LSB and Hamming code. Optik Int J Light Electron Opt. https://doi.org/10.1016/j.ijleo.2020.164685
Khalili M (2015) DCT-Arnold chaotic based watermarking using JPEG-YCbCr. Optik 126(23):4367–4371. https://doi.org/10.1016/j.ijleo.2015.08.042
Batra N, Kaushik P (2012) Data hiding in color images using modified quantization table. International Journal of Advanced Research in Computer Science and Software Engineering 1(8)
Abdel-Wahab OF, Hussein AI, Hamed HFA, Kelash HM, Khalaf AAM, Ali HM (2019) Hiding data in images using steganography techniques with compression algorithms. Telkomnika 17(3):1168–1175
Thabit R, EeKhoo B (2015) A new robust, lossless data hiding scheme and its application to color medical images. Digit Signal Proc 38:77–94. https://doi.org/10.1016/j.dsp.2014.12.005
Abdel-Aziz MM, Hosny KM, Lashin NA (2021) Improved data hiding method for securing color images. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-10217-9
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
All paper prepared by the author OY.
Corresponding author
Ethics declarations
Conflict of interest
The author has no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Abdulhammed, O.Y. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. J Supercomput 80, 226–248 (2024). https://doi.org/10.1007/s11227-023-05459-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05459-x