Abstract
In this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels.
Similar content being viewed by others
References
Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Sci J 11(8)
Ahmad M, Shamsher Alam M (2009) A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering 2(1):46–50
Al-Nuaimy W, El-Bendary MAM, Shafik A, Shawki F, Abou-El-azm AE (2011) An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Processing 21(6):764–779
Arun AS, Joseph GM (2013) High security cryptographic technique using steganography and chaotic image encryption. IOSR Journal of Computer Engineering (IOSR-JCE) 12(5):49–54
Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat map. Chaos, Solitons and Fractals 21:749–761
Choudhary K (2012) Image steganography and global terrorism. Glob Secur Stud 3(4)
El-Bendary MAM (2015) Developing security tools of WSN and WBAN networks applications. Japan, Springer
El-Bendary MAM, Abou-El-azm AE, El-Fishawy NA, Shawki F, El-Tokhy MAR , Kazemian HB (2012) Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J Audio Speech Music Process
El-Bendary MAMM, Abou El-Azm AE, El-Fishawy NA, Al-Hosarey FSM JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int J Electron 99(11):1497–1518
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8:1259–1284
Goel S, Rana A, Kaur M (2013) Comparison of image steganography techniques. International Journal of Computers and Distributed Systems 3(I):20–30
Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Comput J 31(2). doi:10.1109/MC.1998.4655281
Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on LSB insertion and encryption. International Conference on Advances in Recent Technologies in Communication and Computing
Kamal AHM (2013) Steganography: securing message in wireless network. Int J Comput Technol 4(3)
Kanso A, Ghebleh M (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907
L L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of the Physical Sciences 5(17):2543–2554
Liu J-f, Tian Y-g, Han T, Yang C-f, Liu W-b (2015) LSB steganographic payload location for JPEG-decompressed images. Digital Signal Processing 38:66–76
Mehta AM, Lanzisera S, Pister KSJ (2008) Steganography in 802.15.4 wireless communication. 2nd International Symposium on Advanced Networks and Telecommunication Systems, ANTS
Ming C, Ru Z, Xinxin N, Yixian Y (2006) Analysis of current steganography tools: classifications & features. International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’06), IEEE- 0-7695-2745-0/06 $20.00
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MAM, Abd El-Samie FE, Faragallah OS (2016a) Content verification of encrypted images transmitted over wireless AWGN channels. Wirel Pers Commun 216:1–13
Nassar SS, Ayad NM, Kelash HM, El-sayed HS, El-Bendary MAM, Abd El-Samie FE, Faragallah OS (2016b) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun 91(3):1023–1049
Neeta D, Wagh KK, Snehal K, Jacobs D (2006) Implementation of LSB steganography and its evaluation for various bits. 1st International Conference on Digital Information Management, PP. 173–178
Owens M (2002) A discussion of covert channels and steganography. SANS Institute
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map, Sciencedirect Image Vis Comput
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164. doi:10.1016/j.jvcir.2015.06.009
Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An Inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 23(7):1109–1118. doi:10.1109/TCSVT.2012.2224052
Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image In-painting. IEEE Trans Image Process 23(3):969–978. doi:10.1109/TIP.2013.2260760
Raja KB, Chowdary CR, Venugopal KR, Patnaik LM (2005) A secure image steganography using LSB, DCT and compression techniques on raw images. IEEE-0-7803-9588-3/05/$20.00
Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. El Sevier, Applied Soft Computing 30:375–389
Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo S-S, Mehmood I (2016) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl. doi:10.1007/s11042-016-3811-6
Silva AE, Panetta K, Agaian SS (2007) Quantifying image similarity using measure of enhancement by entropy. SPIE Proceedings: Mobile Multimedia/Image Processing for Military and Security Applications 6579:3–14
Soliman NF, Albagory Y, Elbendary MAM, Al-Hanafy W, El-Rabaie EM, Alshebeili SA, Abd El-Samie FE (2014) Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wirel Pers Commun 79(3):2141–2154
Srividya G, Nandakumar P (2011) A triple-key chaotic image encryption method. Communications and Signal Processing (ICCSP), 2011 International Conference on, pp. 266–270
Udhayavene S, Dev AT, Chandrasekaran K (2015) New data hiding technique in encrypted image: DKL algorithm (differing key length). Eleventh international multi-conference on information processing-2015 (IMCIP-2015). Procedia Computer Science 54:790–798
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352. doi:10.1109/TPDS.2015.2401003
Zhangjie FU, Xingming SUN, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190–200
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
El-Bendary, M.A.M. FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimed Tools Appl 76, 26463–26501 (2017). https://doi.org/10.1007/s11042-016-4177-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4177-5