Skip to main content
Log in

FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this research paper, robust and reliable encrypted steganography technique with the error control schemes is presented. It also, investigates the performance of this technique with existing different noises and attacks. The paper presents a powerful security algorithm through merging between the data hiding and encryption techniques. This security merging technique aims to improve and strengthen the image security through its transmission over a wireless channel. Error performance of the presented security algorithm is considered also, and the different error control schemes are utilized to encode the transmitted packets. The steganography conceals the data existence within a cover medium, while the encryption hides the data meaning by using specific algorithms. The chaos based encryption algorithms are considered efficient and secured image encryption algorithms. In this research work a confidential image is embedded into a cover image using the data hiding Least Significant Bit (LSB) Steganography technique and then the stego image is encrypted using two dimensional chaotic map encryption tool. The Logistic map and Chaotic Baker map encryption techniques are utilized for this purpose to produce a multi-level high secure algorithm for sensitive secret image transmission. The computer simulation experiments reveal that the chaotic Baker scenario resist the noise and attacks more than another scenario. The Median filter is utilized to enhance the extracted message quality in existence the Pepper-Salt noise. The encrypted stego signal performance is evaluated over the AWGN channel and different attacks. To improve the extraction of Logistic steganography, the FEC is employed for this purpose and to decrease the required SNR which permits the successfully embedded image extraction. These different error control techniques are utilized to improve the presented algorithm reliability over the wireless channels. There are several metrics are used to measure the extracted images quality such as the correlation coefficient, mean square error, and peak signal to noise ratio. Also, the number of lost packet is used as data loss attack and to evaluate the wireless link efficiency. Different image analyses and comparisons are verified to examine the suitability of proposed algorithms for securing a high sensitive image data through its transmission over wireless channel at different noise levels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40

Similar content being viewed by others

References

  1. Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Sci J 11(8)

  2. Ahmad M, Shamsher Alam M (2009) A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering 2(1):46–50

    Google Scholar 

  3. Al-Nuaimy W, El-Bendary MAM, Shafik A, Shawki F, Abou-El-azm AE (2011) An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Processing 21(6):764–779

    Article  Google Scholar 

  4. Arun AS, Joseph GM (2013) High security cryptographic technique using steganography and chaotic image encryption. IOSR Journal of Computer Engineering (IOSR-JCE) 12(5):49–54

    Article  Google Scholar 

  5. Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat map. Chaos, Solitons and Fractals 21:749–761

    Article  MathSciNet  MATH  Google Scholar 

  6. Choudhary K (2012) Image steganography and global terrorism. Glob Secur Stud 3(4)

  7. El-Bendary MAM (2015) Developing security tools of WSN and WBAN networks applications. Japan, Springer

    Book  Google Scholar 

  8. El-Bendary MAM, Abou-El-azm AE, El-Fishawy NA, Shawki F, El-Tokhy MAR , Kazemian HB (2012) Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J Audio Speech Music Process

  9. El-Bendary MAMM, Abou El-Azm AE, El-Fishawy NA, Al-Hosarey FSM JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int J Electron 99(11):1497–1518

  10. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8:1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  11. Goel S, Rana A, Kaur M (2013) Comparison of image steganography techniques. International Journal of Computers and Distributed Systems 3(I):20–30

    Google Scholar 

  12. Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Comput J 31(2). doi:10.1109/MC.1998.4655281

  13. Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on LSB insertion and encryption. International Conference on Advances in Recent Technologies in Communication and Computing

  14. Kamal AHM (2013) Steganography: securing message in wireless network. Int J Comput Technol 4(3)

  15. Kanso A, Ghebleh M (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907

    Article  Google Scholar 

  16. L L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of the Physical Sciences 5(17):2543–2554

    Google Scholar 

  17. Liu J-f, Tian Y-g, Han T, Yang C-f, Liu W-b (2015) LSB steganographic payload location for JPEG-decompressed images. Digital Signal Processing 38:66–76

    Article  Google Scholar 

  18. Mehta AM, Lanzisera S, Pister KSJ (2008) Steganography in 802.15.4 wireless communication. 2nd International Symposium on Advanced Networks and Telecommunication Systems, ANTS

  19. Ming C, Ru Z, Xinxin N, Yixian Y (2006) Analysis of current steganography tools: classifications & features. International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’06), IEEE- 0-7695-2745-0/06 $20.00

  20. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MAM, Abd El-Samie FE, Faragallah OS (2016a) Content verification of encrypted images transmitted over wireless AWGN channels. Wirel Pers Commun 216:1–13

    Google Scholar 

  21. Nassar SS, Ayad NM, Kelash HM, El-sayed HS, El-Bendary MAM, Abd El-Samie FE, Faragallah OS (2016b) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun 91(3):1023–1049

  22. Neeta D, Wagh KK, Snehal K, Jacobs D (2006) Implementation of LSB steganography and its evaluation for various bits. 1st International Conference on Digital Information Management, PP. 173–178

  23. Owens M (2002) A discussion of covert channels and steganography. SANS Institute

    Google Scholar 

  24. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  25. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map, Sciencedirect Image Vis Comput

  26. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164. doi:10.1016/j.jvcir.2015.06.009

    Article  Google Scholar 

  27. Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An Inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 23(7):1109–1118. doi:10.1109/TCSVT.2012.2224052

    Article  Google Scholar 

  28. Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image In-painting. IEEE Trans Image Process 23(3):969–978. doi:10.1109/TIP.2013.2260760

    Article  MathSciNet  MATH  Google Scholar 

  29. Raja KB, Chowdary CR, Venugopal KR, Patnaik LM (2005) A secure image steganography using LSB, DCT and compression techniques on raw images. IEEE-0-7803-9588-3/05/$20.00

  30. Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. El Sevier, Applied Soft Computing 30:375–389

    Article  Google Scholar 

  31. Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo S-S, Mehmood I (2016) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl. doi:10.1007/s11042-016-3811-6

    Google Scholar 

  32. Silva AE, Panetta K, Agaian SS (2007) Quantifying image similarity using measure of enhancement by entropy. SPIE Proceedings: Mobile Multimedia/Image Processing for Military and Security Applications 6579:3–14

  33. Soliman NF, Albagory Y, Elbendary MAM, Al-Hanafy W, El-Rabaie EM, Alshebeili SA, Abd El-Samie FE (2014) Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wirel Pers Commun 79(3):2141–2154

    Article  Google Scholar 

  34. Srividya G, Nandakumar P (2011) A triple-key chaotic image encryption method. Communications and Signal Processing (ICCSP), 2011 International Conference on, pp. 266–270

  35. Udhayavene S, Dev AT, Chandrasekaran K (2015) New data hiding technique in encrypted image: DKL algorithm (differing key length). Eleventh international multi-conference on information processing-2015 (IMCIP-2015). Procedia Computer Science 54:790–798

    Article  Google Scholar 

  36. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352. doi:10.1109/TPDS.2015.2401003

    Article  Google Scholar 

  37. Zhangjie FU, Xingming SUN, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190–200

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen A. M. El-Bendary.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El-Bendary, M.A.M. FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimed Tools Appl 76, 26463–26501 (2017). https://doi.org/10.1007/s11042-016-4177-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4177-5

Keywords

Navigation