Skip to main content

Advertisement

Log in

A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

After the tremendous development and fast growth in communication systems and electronic devices, information security and preservation have become one of the most important procedures to be considered when transferring data between two parties. Encryption and data hiding are two of the most important techniques to protect the information sent over networks and the Internet. In this paper, a new technique of encryption and concealment is used through the following steps: First, the secret information is encrypted by using developed DNA to get (S1), second, by scrambling the encrypted data, the (S1) is diffused by using a zigzag method to get (S2), third, re-obfuscation the (S2) by using developed zigzag method through using Tinkerbell technique to get (S3), fourth, perform XoR operation between the (S3) and the Tinkerbell technique to get (S4), and fifth, the (S4) is hidden in the random locations of the cover image based on the LSB technique and the Tinkerbell technology, where the Tinkerbell has incredibly excellent characteristics and used to generate random sequence numbers twice with different initial and parameters value, once for the encryption process for scrambling secret information and once for the hiding process for determining hidden locations. Several metrics were used to evaluate the system's efficiency: histogram, PSNR, MSE, mean absolute error, bit error rate, encryption quality, Unified Average Changing Intensity, hamming distance, entropy, and correlation coefficient. The experimental results display that the suggested method has a good performance and reliability, high security, and greater embedding capacity and ensures higher image quality; also, the proposed method presented preferable outcomes when compared to other approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The datasets generated during the current study are available in the USC-SIPI image database (available for free at http://sipi.usc.edu/database/).

References

  1. Abdulhammed OY (2022) A novel approach of steganography by using strong edge detection and chaos theory. Multimedia Tools Appl. https://doi.org/10.1007/s11042-022-12643-3

    Article  Google Scholar 

  2. El-Khamy SE, KoranylEl-Sherif NOMH (2016) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimedia Tools Appl. https://doi.org/10.1007/s11042-016-4113-8

    Article  Google Scholar 

  3. Abdulhammed OY (2022) SFO for enhancing steganography by exploiting exact resemblance between cover and secure text. Acta Sci Technol. https://doi.org/10.4025/actascitechnol.v44i1.57581

    Article  Google Scholar 

  4. Karim AB, Abdalqader PS, Najim ZT, Salhd AM, Abdulhammed OY (2021) Color image encryption with a novel technique and chaotic singer map. Sci J Univ Zakho. https://doi.org/10.25271/sjuoz.2021.9.3.316

    Article  Google Scholar 

  5. Abdulhammed OY (2020) strengthening steganography by using crow search algorithm of fingerprint image. East-Eur J Enterpr Technol. https://doi.org/10.15587/1729-4061.2020.200282

    Article  Google Scholar 

  6. Talee GT, Jelmeran MJ, Mohammed SJ (2014) A new approach for chaotic encrypted data hiding in color image. Int J Comput Appl. https://doi.org/10.5120/15006-3233

    Article  Google Scholar 

  7. Kekre HB, Athawale A, Rao S, Athawale U (2010) Information hiding in audio signals. Int J Comput Appl 7(9):14–19

    Google Scholar 

  8. Vanmathi C, Prabu S (2017) Image steganography using fuzzy logic and chaotic for large payload and high imperceptibility. Int J Fuzzy Syst. https://doi.org/10.1007/s40815-017-0420-0

    Article  Google Scholar 

  9. Pareek NK, Vinod P, Sud (2006) Image encryption using chaotic. logistic map. Image Vis Comput. https://doi.org/10.1016/j.imavis.2006.02.021

    Article  Google Scholar 

  10. Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Priv Trust Manag. https://doi.org/10.5121/ijsptm.2014.3102

    Article  Google Scholar 

  11. Hanchinamani G, Kulakarni L (2014) A novel approach for image encryption based on parametric mixing chaotic system. Int J Comput Appl. https://doi.org/10.5120/16839-6690

    Article  Google Scholar 

  12. Goldsztejn A, Hayes W, Collins P (2011) Tinkerbell Is Chaotic siam j. Appl Dyn Syst. https://doi.org/10.1137/100819011

    Article  Google Scholar 

  13. Al-Shara IM, Al-Ftlawy DM (2013) The dynamics of the 2-d piecewise tinkerbell map. Mathematical theory and modeling.

  14. Yildirim M (2021) Steganography-based voice hiding in medical images of COVID-19 patients. Nonlinear Dyn. https://doi.org/10.1007/s11071-021-06700-z

    Article  Google Scholar 

  15. Wang Y, Tang M, Wang Z (2020) High-capacity adaptive steganography based on LSB and Hamming code. Optik Int J Light Electron Opt. https://doi.org/10.1016/j.ijleo.2020.164685

    Article  Google Scholar 

  16. Khalili M (2015) DCT-Arnold chaotic based watermarking using JPEG-YCbCr. Optik 126(23):4367–4371. https://doi.org/10.1016/j.ijleo.2015.08.042

    Article  Google Scholar 

  17. Batra N, Kaushik P (2012) Data hiding in color images using modified quantization table. International Journal of Advanced Research in Computer Science and Software Engineering 1(8)

  18. Abdel-Wahab OF, Hussein AI, Hamed HFA, Kelash HM, Khalaf AAM, Ali HM (2019) Hiding data in images using steganography techniques with compression algorithms. Telkomnika 17(3):1168–1175

    Article  Google Scholar 

  19. Thabit R, EeKhoo B (2015) A new robust, lossless data hiding scheme and its application to color medical images. Digit Signal Proc 38:77–94. https://doi.org/10.1016/j.dsp.2014.12.005

    Article  Google Scholar 

  20. Abdel-Aziz MM, Hosny KM, Lashin NA (2021) Improved data hiding method for securing color images. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-10217-9

    Article  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

All paper prepared by the author OY.

Corresponding author

Correspondence to Omar Younis Abdulhammed.

Ethics declarations

Conflict of interest

The author has no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdulhammed, O.Y. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. J Supercomput 80, 226–248 (2024). https://doi.org/10.1007/s11227-023-05459-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05459-x

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy