Log in

Dynamic 8-bit XOR algorithm with AES crypto algorithm for image steganography

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

The proliferation of the Internet’s infrastructure, extending even to rural areas, has propelled images to the forefront of multimedia content, necessitating the need for robust methods to safeguard confidential data. Image steganography has emerged as a pivotal technique for concealing sensitive information within images, amidst growing threats to copyright protection and content integrity. To address these challenges, this research proposes a novel approach that combines the dynamic 8-bit XOR algorithm with the AES crypto algorithm, aiming to fortify the outcomes of image steganography. The method entails encrypting messages using AES encryption, followed by embedding them within images using the dynamic XOR method, ensuring both security and imperceptibility. The study’s objectives include assessing the impact of secret message size and stego image dimensions on algorithm efficiency, evaluating through metrics like PSNR, MSE, NPCR, and entropy. Notably, histogram analysis reveals minimal differences between original and stego images, underscoring the difficulty in detecting hidden information. Moreover, the study delves into the influence of secret message size on algorithm performance, highlighting a trade-off between text size and PSNR, where smaller sizes exhibit stronger concealment capabilities. Additionally, the impact of stego image dimension size is examined, revealing varied performance metrics based on different dimensions. Comparisons with existing encryption methods indicate favourable outcomes for the proposed algorithm in terms of PSNR, NPCR, and entropy. Notably, PSNR values range from 74.17 to 80.17 dB, while NPCR values vary from 87.98 to 99.81%. Moreover, MSE values range from 0.000621 to 0.04, and entropy values range from 7.39 to 7.64 dB. The study contributes valuable insights into image steganography, emphasizing the need for robust techniques to safeguard sensitive data in multimedia content. Through comprehensive evaluation and comparison, the proposed method demonstrates promising potential for real-world applications, addressing critical concerns surrounding content protection and data security in the digital age.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. IJ Kadhim P Premaratne PJ Vial B Halloran 2019 Comprehensive survey of image steganography: techniques, evaluations, and trends in future research Neurocomputing 335 299 326

    Google Scholar 

  2. D Artz 2001 Digital steganography: hiding data within data IEEE Internet Comput. 5 3 75 80

    Google Scholar 

  3. AK Sahu G Swain 2019 High fidelity based reversible data hiding using modified LSB matching and pixel difference J. King Saud Univ. Comput. Inf. Sci. https://doi.org/10.1016/j.jksuci.2019.07.004

    Article  Google Scholar 

  4. H Noda M Niimi E Kawaguchi 2006 High-performance JPEG steganography using quantization index modulation in DCT domain Pattern Recognit. Lett. 27 5 455 461

    Google Scholar 

  5. A Sahu G Swain 2019 Dual stego-imaging based reversible data hiding using improved LSB matching Int. J. Intell. Eng. Syst. 12 5 63 73

    Google Scholar 

  6. H Sajedi M Jamzad 2010 BSS: Boosted steganography scheme with cover image preprocessing Expert Syst. Appl. 37 12 7703 7710

    Google Scholar 

  7. W-J Chen C-C Chang THN Le 2010 High payload steganography mechanism using hybrid edge detector Expert Syst. Appl. 37 4 3292 3301

    Google Scholar 

  8. A Ioannidou ST Halkidis G Stephanides 2012 A novel technique for image steganography based on a high payload method and edge detection Expert Syst. Appl. 39 14 11517 11524

    Google Scholar 

  9. D-C Wu W-H Tsai 2003 A steganographic method for images by pixel-value differencing Pattern Recognit. Lett. 24 9–10 1613 1626

    Google Scholar 

  10. C-H Yang C-Y Weng S-J Wang H-M Sun 2008 Adaptive data hiding in edge areas of images with spatial LSB domain systems IEEE Trans. Inf. Forensics Secur. 3 3 488 497

    Google Scholar 

  11. Naor, M., Shamir, A.: Visual cryptography II: improving the contrast via the cover base, in Proc. Int. Workshop Secur. Protocols. Berlin, Germany: Springer, 1996, pp. 197–202. [Online]. Available: https://springer.longhoe.net/chapter/https://doi.org/10.1007/3-540-62494-5_18#citeas

  12. A Shamir 1979 How to share a secret Commun. ACM 22 11 612 613

    MathSciNet  Google Scholar 

  13. C-K Chan LM Cheng 2004 Hiding data in images by simple LSB substitution Pattern Recognit. 37 3 469 474

    Google Scholar 

  14. M Hussain AWA Wahab YIB Idris ATS Ho K-H Jung 2018 Image steganography in spatial domain: a survey Signal Process Image Commun. 65 46 66

    Google Scholar 

  15. A Khamrui JK Mandal 2013 A genetic algorithm based steganography using discrete cosine transformation (GASDCT) Procedia Technol. 10 105 111

    Google Scholar 

  16. SK Bandyopadhyay TU Paul A Raychoudhury 2010 A novel stegano graphic technique based on 3D-DCT approach Comput. Inf. Sci. 3 4 229

    Google Scholar 

  17. B Kaur A Kaur J Singh 2011 Steganographic approach for hiding image in DCT domain Int. J. Adv. Eng. Technol. 1 3 72

    Google Scholar 

  18. P-Y Chen H-J Lin 2006 A DWT based approach for image steganography Int. J. Appl. Sci. Eng. 4 3 275 290

    Google Scholar 

  19. W-Y Chen 2008 Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques Appl. Math. Comput. 196 1 40 54

    MathSciNet  Google Scholar 

  20. AK Sahu G Swain 2020 Reversible image steganography using dual layer LSB matching Sens. Imag. 21 1 1

    Google Scholar 

  21. M Li S Yu Y Zheng K Ren W Lou 2013 Scalable and secure sharing of personal health records in cloud computing using attribute based encryption IEEE Trans. Parallel Distrib. Syst. 24 1 131 143

    Google Scholar 

  22. H Sajedi 2018 Applications of data hiding techniques in medical and health care systems: a survey Netw. Model. Anal. Health Informat. Bioinf. 7 1 6

    Google Scholar 

  23. S Arunkumar V Subramaniyaswamy V Vijayakumar N Chilamkurti R Logesh 2019 SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images Measurement 139 426 437

    Google Scholar 

  24. RJ Anderson FAP Petitcolas 1998 On the limits of steganography IEEE J. Sel. Areas Commun. 16 4 474 481

    Google Scholar 

  25. X Liao J Yin S Guo X Li AK Sangaiah 2018 Medical JPEG image steganography based on preserving inter-block dependencies Comput. Electr. Eng. 67 320 329

    Google Scholar 

  26. M Sajjad K Muhammad SW Baik S Rho Z Jan S-S Yeo I Mehmood 2017 Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices Multimed. Tools Appl. 76 3 3519 3536

    Google Scholar 

  27. N Alsaidi M Alshareef A Alsulami M Alsafri A Aljahdali 2020 Digital steganography in computer forensics Int. J. Comput. Sci. Inf. Secur. 18 5 54 61

    Google Scholar 

  28. M Elhoseny G Ramírez-González OM Abu-Elnasr SA Shawkat N Arunkumar A Farouk 2018 Secure medical data transmission model for IoT-based healthcare systems IEEE Access 6 20596 20608

    Google Scholar 

  29. Mansor, N.K., Asraf, S.M.H., Idrus, S.Z.S.: Steganographic on pixel value differencing in iris biometric, J. Phys., Conf. Ser., vol. 1529, no. 3, Apr. 2020, Art. no. 032078.

  30. A Shehab M Elhoseny K Muhammad AK Sangaiah P Yang H Huang G Hou 2018 Secure and robust fragile watermarking scheme for medical images IEEE Access 6 10269 10278

    Google Scholar 

  31. H-Y Lee 2019 Adaptive reversible watermarking for authentication and privacy protection of medical records Multimed. Tools Appl. 78 14 19663 19680

    Google Scholar 

  32. JA Kaw NA Loan SA Parah K Muhammad JA Sheikh GM Bhat 2019 A reversible and secure patient information hiding system for IoT driven e-health Int. J. Inf. Manage. 45 262 275

    Google Scholar 

  33. SA Parah F Ahad JA Sheikh NA Loan GM Bhat 2017 A new reversible and high capacity data hiding technique for e-healthcare applications Multimed. Tools Appl. 76 3 3943 3975

    Google Scholar 

  34. K Rabah 2004 Steganography—the art of hiding data Inf. Technol. J. 3 3 245 269

    Google Scholar 

  35. AK Sahu G Swain 2019 An optimal information hiding approach based on pixel value differencing and modulus function Wireless Pers. Commun. 108 1 159 174

    Google Scholar 

  36. AK Sahu G Swain 2019 A novel n-rightmost bit replacement image steganography technique 3D Res. 10 1 2

    Google Scholar 

  37. AK Sahu G Swain 2018 Pixel overlap** image steganography using PVD and modulus function 3D Res. 9 3 40

    Google Scholar 

  38. AK Sahu G Swain ES Babu 2018 Digital image steganography using bit flip** Cybern. Inf. Technol. 18 1 69 80

    MathSciNet  Google Scholar 

  39. R Wazirali Z Chachzo 2016 Hyper edge detection with clustering for data hiding J. Inf. Hiding Multimedia Signal Process. 7 1 1 10

    Google Scholar 

  40. Z Wang Z Qian X Zhang M Yang D Ye 2018 On improving distortion functions for JPEG steganography IEEE Access 6 74917 74930

    Google Scholar 

  41. F Li K Wu X Zhang J Yu J Lei M Wen 2018 Robust batch steganography in social networks with non-uniform payload and data decomposition IEEE Access 6 29912 29925

    Google Scholar 

  42. J Tao S Li X Zhang Z Wang 2019 Towards robust image steganog raphy IEEE Trans. Circuits Syst. Video Technol. 29 2 594 600007A

    Google Scholar 

  43. S Li X Zhang 2019 Toward construction-based data hiding: From secrets to fingerprint images IEEE Trans. Image Process 28 3 1482 1497

    MathSciNet  Google Scholar 

  44. Madhu, D., Vasuhi, S.: Image steganography: 2-Bit XOR algorithm used in YCbCr color model with crypto-algorithm, 4th International Conference on Computer, Communication and Signal Processing (ICCCSP), 2020.

  45. K Patel S Utareja H Gupta 2013 Information hiding using least significant bit steganography and blowfish algorithm Int. J. Comput. Appl. 63 24 28

    Google Scholar 

  46. M Jain SK Lenka SK Vasistha 2016 Adaptive circular queue image steganography with RSA cryptosystem Perspect. Sci. 8 417 420

    Google Scholar 

  47. R Rajkumar A Vasuki 2018 Reversible and robust image watermarking based on histogram shifting Clust. Comput. 22 12313 12323

    Google Scholar 

  48. T Zong Y **ang I Natgunanathan S Guo W Zhou G Beliakov 2014 Robust histogram shape-based technique for image watermarking IEEE Trans. Circuits Syst. Video Technol. 25 717 729

    Google Scholar 

  49. AK Rai N Kumar R Kumar H Om S Chand KH Jung 2021 Intra-block correlation based reversible data hiding in encrypted images using parametric binary tree labeling Symmetry 13 1072

    Google Scholar 

  50. S Xu J-H Horng C-C Chang 2021 Reversible data hiding scheme based on VQ prediction and adaptive parametric binary tree labeling for encrypted images IEEE Access 9 55191 55204

    Google Scholar 

  51. F Aziz T Ahmad AH Malik MI Uddin S Ahmad M Sharaf 2020 Reversible data hiding techniques with high message embedding capacity in images PLoS ONE 15 e0231602

    Google Scholar 

  52. AK Sahu 2021 A logistic map based blind and fragile watermarking for tamper detection and localization in images J. Ambient. Intell. Humaniz. Comput. 13 3869 3881

    Google Scholar 

  53. Volume 2: Aerials. Available online: http://sipi.usc.edu/database/database.php?volume=aerials&image=5#top (accessed on 19 August 2022).

  54. S Ayyappan C Lakshmi 2018 A review on reversible data hiding techniques Int. J. Appl. Eng. Res. 13 2857 2864

    Google Scholar 

  55. AK Sahu M Hassaballah RS Rao G Suresh 2022 Logistic-map based fragile image watermarking scheme for tamper detection and localization Multimed. Tools Appl. 82 1 32

    Google Scholar 

  56. J Wang N Mao X Chen J Ni C Wang Y Shi 2019 Multiple histograms based reversible data hiding by using FCM clustering Signal Process 159 193 203

    Google Scholar 

  57. AK Sahu M Sahu P Patro G Sahu SR Nayak 2022 Dual image-based reversible fragile watermarking scheme for tamper detection and localization Pattern Anal. Appl. 26 1 20

    Google Scholar 

  58. K Zhou Y Ding W Bi 2020 High-capacity PVO-based reversible data hiding scheme using changeable step size Multimed. Tools Appl. 80 1123 1141

    Google Scholar 

  59. Z Pan E Gao 2019 Reversible data hiding based on novel embedding structure PVO and adaptive block-merging strategy Multimed. Tools Appl. 78 26047 26071

    Google Scholar 

  60. IJ Cox ML Miller JA Bloom J Fridrich T Kalker 2007 Digital watermarking and steganography Morgan Kaufmann Burlington

    Google Scholar 

  61. M Fallahpour D Megias M Ghanbari 2011 Reversible and high-capacity data hiding in medical images IET Image Process 5 190 197

    Google Scholar 

  62. RK Ramesh R Dodmane S Shetty G Aithal M Sahu AK Sahu 2023 A Novel and secure fake-modulus based Rabin-ӡ cryptosystem Cryptography 7 44 https://doi.org/10.3390/cryptography7030044

    Article  Google Scholar 

  63. KR Raghunandan Bhavya Kallapu Radhakrishna Dodmane NS Krishnaraj Rao Srinivasarao Thota Aditya Kumar Sahu 2023 Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption Electronics 12 3890 https://doi.org/10.3390/electronics12183890

    Article  Google Scholar 

  64. S Thomas 2023 A novel image compression method using wavelet coefficients and Huffman coding J. Eng. Res. 1 1 1 10

    MathSciNet  Google Scholar 

  65. S Kamil Khudhair M Sahu KR Raghunandan AK Sahu 2023 Secure reversible data hiding using block-wise histogram shifting Electronics 12 5 1222 https://doi.org/10.3390/electronics12051222

    Article  Google Scholar 

  66. ME Hameed MM Ibrahim NA Manap 2018 Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security J. Telecommun. Electron. Comput. Eng. 10 1 139 145

    Google Scholar 

  67. Z Wang HR Sheikh AC Bovik 2018 “Objective Video Quality Assessment” in The handbook of video databases: design and applications CRC Press Florida 1041 1078

    Google Scholar 

  68. Stoica, A. Vertan, C., Fernandez-Maloigne, C.: Objective and subjective color image quality evaluation for JPEG 2000 compressed images, presented at International Symposium on Signals, Circuits and Systems, SCS 2003, 10–11 Jul, 2003.

  69. GF Siddiqui 2020 A dynamic three-bit image steganography algorithm for medical and e-healthcare systems IEEE Access 8 181893 181903

    Google Scholar 

  70. NA Loan SA Parah JA Sheikh JA Akhoon GM Bhat 2017 Hiding electronic patient record (EPR) in medical images: a high capacity and computationally ef_cient technique for e-healthcare applications J. Biomed. Informat. 73 125 136

    Google Scholar 

  71. A Rehman T Saba T Mahmood Z Mehmood M Shah A Anjum 2019 Data hiding technique in steganography for information security using number theory J. Inf. Sci. 45 6 767 778

    Google Scholar 

  72. K Muhammad J Ahmad H Farman Z Jan M Sajjad SW Baik 2015 A secure method for color image steganography using gray-level modification and multi-level encryption Trans. Internet Inf. Syst. 9 5 1938 1962

    Google Scholar 

  73. K Bailey K Curran 2006 An evaluation of image-based steganography methods Multimed. Tools Appl. 30 1 55 88

    Google Scholar 

  74. Masud Karim, S.M., Rahman, M.S., Hossain M.I.: “A new approach for LSB based image steganography using secret key,’’ in Proc. 14th Int. Conf. Comput. Inf. Technol. (ICCIT), Dec. 2011, pp. 286–291.

  75. Jassim, F.A.: “A novel steganography algorithm for hiding text in image using five modulus methods,’’ 2013, ar**v:1307.0642.

  76. ST Kamal KM Hosny TM Elgindy MM Darwish MM Fouda 2021 A New image encryption algorithm for grey and color medical images IEEE Access 9 37855 37865

    Google Scholar 

  77. SE El-Khamy NO Korany AG Mohamed 2020 A new fuzzy-DNA image encryption and steganography technique IEEE Access 8 148935 148951

    Google Scholar 

  78. R Wazirali W Alasmary MMEA Mahmoud A Alhindi 2019 An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms IEEE Access 7 133496 133508

    Google Scholar 

  79. X Wang J Yang 2021 A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient Inf. Sci. 569 217 240

    MathSciNet  Google Scholar 

  80. H Liu B Zhao L Huang 2019 A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map IEEE Access 7 65450 65459

    Google Scholar 

  81. X Zhang X Wang 2018 Remote-sensing image encryption algorithm using the advanced encryption standard Appl. Sci. 8 9 1540

    Google Scholar 

  82. Sedighi, M., Mahmoudi, S.K., Amini, A.S.:, “Proposing a new method for encrypting satellite images based on hash function and chaos parameters,” Proceedings of the 2019 GeoSpatial Conference 2019—Joint Conferences of SMPR and GI Research, pp. 949–953, University of Tehran, Tehran, Iran, 12–14 October 2019.

  83. X Wang L Liu Y Zhang 2015 A novel chaotic block image encryption algorithm based on dynamic random growth technique Opt. Lasers Eng. 66 10 18

    Google Scholar 

  84. Z Hua Y Zhou CM Pun CP Chen 2015 2D Sine Logistic modulation map for image encryption Inf. Sci. 297 80 94

    Google Scholar 

  85. A Alanezi B Abd-El-Atty H Kolivand A El-Latif A Ahmed A El-Rahiem S Sankar S Khalifa 2021 Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment Secur. Commun. Netw. https://doi.org/10.1155/2021/6615512

    Article  Google Scholar 

  86. J Arif MA Khan B Ghaleb J Ahmad A Munir U Rashid A Al-Dubai 2022 A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution IEEE Access 10 12966 12982

    Google Scholar 

  87. Q Lu C Zhu X Deng 2020 An efficient image encryption scheme based on the LSS chaotic map and single S-box IEEE Access 8 25664 25678

    Google Scholar 

  88. M Samiullah W Aslam H Nazir MI Lali B Shahzad MR Mufti H Afzal 2020 An image encryption scheme based on DNA computing and multiple chaotic systems IEEE Access 8 25650 25663

    Google Scholar 

  89. A Qayyum J Ahmad W Boulila S Rubaiee F Masood F Khan WJ Buchanan 2020 Chaos-based confusion and diffusion of image pixels using dynamic substitution IEEE Access 8 140876 140895

    Google Scholar 

  90. D Madhu S Vasuhi 2023 Lightweight encryption assisted man-in-the-middle attack-resilient steganography model for secure satellite imagery services: LEMARS’ J. Intell. Fuzzy Syst. 45 2 2847 2869

    Google Scholar 

  91. P Asmitha C Rupa S Nikitha 2024 Improved multiview biometric object detection for anti spoofing frauds Multimed. Tools Appl. https://doi.org/10.1007/s11042-024-18458-8

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

D & S did the research work . A prepared paper work and supported in results . D prepared Literature survey , S prepared Introduction in paper & A prepared tables.

Corresponding author

Correspondence to D. Madhu.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madhu, D., Vasuhi, S. & Samydurai, A. Dynamic 8-bit XOR algorithm with AES crypto algorithm for image steganography. SIViP 18 (Suppl 1), 429–445 (2024). https://doi.org/10.1007/s11760-024-03165-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-024-03165-6

Keywords

Navigation