Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats
Abstract
:1. Introduction
2. Related Works
3. Proposed Algorithm
3.1. Magic Matrix (McMx)
3.2. Multi-Level Encryption Algorithm (MLEA)
Algorithm 1. Embedding Process |
Input: Cover Image CI Cx, y, Secret Information Si Output: Stego Image SI |
|
Algorithm 2. Extraction Algorithm |
Input: Stego Image S x, y Output: Original Image and Secret Information Si |
|
Algorithm 3. Multi-Level Encryption |
MLEA process on Proposed Algorithm |
Input: Secret Message Si Output: Concatenation of B1 and B2 |
|
3.3. Mathematical Formulation of Proposed Method
4. Experimental Results and Discussion
4.1. Perspective One P1
4.2. Perspective Two P2
4.3. Perspective Three P3
4.4. Perspective Four P4
4.5. Comparison of the Proposed Algorithm with Other Recently Reported Research Work Based on PSNR
4.6. Results of Proposed Algorithm Based on Cumulative IQAM’s
4.7. Security Analysis for the Proposed Algorithm
4.8. Histogram Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hashim, M.M.; Rahim MS, M.; Johi, F.A.; Taha, M.S.; Hamad, H.S. Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. Int. J. Eng. Technol. 2018, 7, 3505–3514. [Google Scholar]
- Sahu, M.; Padhy, N.; Gantayat, S.S.; Sahu, A.K. Local binary pattern-based reversible data hiding. CAAI Trans. Intell. Technol. 2022, 7, 695–709. [Google Scholar] [CrossRef]
- Shehab, D.A.; Alhaddad, M.J. Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research. Symmetry 2022, 14, 117. [Google Scholar] [CrossRef]
- Fridrich, J. A new steganographic method for palette-based images. In Proceedings of the Conference on Image Processing, Image Quality and Image Capture Systems (PICS), Savannah, GA, USA, 25–28 April 1999; pp. 285–289. [Google Scholar]
- Sujitha, P.; Murali, G. Authentication of grayscale document images via the use of PNG image with data repairing. Int. J. Sci. Res. (IJSR) 2013, 2, 173–176. [Google Scholar]
- Zin, W.W. Message embedding in PNG file using LSB steganographic technique. Int. J. Sci. Res. 2013, 2, 227–230. [Google Scholar]
- Chen, Y.F.; Chien, S.W.; Lin, H.H. True color image Steganography using palette and minimum span-ning tree. In Proceedings of the WSEAS International Conference—Mathematics and Computers in Science and Engineering (No. 3), Ningbo, China, 10–12 January 2009; World Scientific and Engineering Academy and Society: Attica, Greece, 2009. [Google Scholar]
- Zhang, Y.; Luo, X.; Yang, C.; Ye, D.; Liu, F. A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24–27 August 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 461–466. [Google Scholar] [CrossRef]
- Yang, C.-N.; Kim, C.; Lo, Y.-H. Adaptive real-time reversible data hiding for JPEG images. J. Real-Time Image Process. 2016, 14, 147–157. [Google Scholar] [CrossRef]
- Hiney, J.; Dakve, T.; Szczypiorski, K.; Gaj, K. Using facebook for image steganography. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24–27 August 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 442–447. [Google Scholar]
- Parvez, M.T.; Gutub, A.A.A. Vibrant color image steganography using channel differences and secret data distribution. Kuwait J. Sci. Eng. 2011, 38, 127–142. [Google Scholar]
- Srinivasan, A.; Wu, J.; Shi, J. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss. EAI Endorsed Trans. Ambient Syst. 2015, 2, e2. [Google Scholar] [CrossRef] [Green Version]
- Ramaiya, M.K.; Hemrajani, N.; Saxena, A.K. Security improvisation in image steganography using DES. In Proceedings of the 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 22–23 February 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1094–1099. [Google Scholar]
- Grover, N.; Mohapatra, A.K. Digital image authentication model based on edge adaptive steganog-raphy. In Proceedings of the 2013 2nd International Conference on Advanced Computing, Networking and Security, Mangalore, India, 15–17 December 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 238–242. [Google Scholar]
- Sahu, A.K.; Hassaballah, M.; Rao, R.S.; Suresh, G. Logistic-map based fragile image watermarking scheme for tamper detection and localization. Multimed. Tools Appl. 2022, 1–32. [Google Scholar] [CrossRef]
- Sadad, T.; Rehman, A.; Hussain, A.; Abbasi, A.A.; Khan, M.Q. A Review on Multi-organ Cancer Detection Using Advanced Machine Learning Techniques. Curr. Med. Imaging 2021, 17, 686–694. [Google Scholar] [CrossRef]
- Cheddad, A.; Condell, J.; Curran, K.; Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Process. 2010, 90, 727–752. [Google Scholar] [CrossRef] [Green Version]
- Alabaichi, A.; Al-Dabbas, M.A.A.K.; Salih, A. Image steganography using least significant bit and secret map techniques. Int. J. Electr. Comput. Eng. (IJECE) 2020, 10, 935–946. [Google Scholar] [CrossRef] [Green Version]
- Available online: https://developer.mozilla.org/en-US/docs/Web/Media/Formats/Image_types (accessed on 10 March 2022).
- Available online: https://guides.lib.umich.edu/c.php?g=282942&p=1885348U (accessed on 1 March 2022).
- Available online: https://blog.hubspot.com/insiders/different-types-of-image-files (accessed on 5 July 2022).
- Available online: https://www.scantips.com/basics09.html (accessed on 11 June 2022).
- Araujo, I.I.; Kazemian, H. Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography. Int. J. Comput. Netw. Inform. Secur. (IJCNIS) 2019, 11, 21–27. [Google Scholar] [CrossRef]
- Dhawan, S.; Gupta, R. Analysis of various data security techniques of steganography: A survey. Inf. Secur. J. A Glob. Perspect. 2020, 30, 63–87. [Google Scholar] [CrossRef]
- Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing 2018, 335, 299–326. [Google Scholar] [CrossRef]
- Chhabra, A.; Woeden, T.; Singh, D.; Rakhra, M.; Dahiya, O.; Gupta, A. Image Steganalysis with Image decoder using LSB and MSB Technique. In Proceedings of the 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 27–29 April 2022; pp. 900–905. [Google Scholar]
- Kharrazi, M.; Sencar, H.T.; Memon, N. Image Steganography: Concepts and Practice; Lecture Note Series; Institute for Mathematical Sciences; National University of Singapore: Singapore, 2004. [Google Scholar]
- M. Al-Shatanawi, O.; N.El.Emam, N. A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection. Int. J. Netw. Secur. Appl. 2015, 7, 37–53. [Google Scholar] [CrossRef]
- Holub, V.; Fridrich, J.; Denemark, T. Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 2014, 1. [Google Scholar] [CrossRef] [Green Version]
- Voleti, L.; Balajee, R.M.; Vallepu, S.K.; Bayoju, K.; Srinivas, D. A secure image steganography using improved LSB technique and Vigenere cipher algorithm. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 25–27 March 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1005–1010. [Google Scholar]
- Amirtharajan, R.; Behera, S.K.; Swarup, M.A.; Rayappan, J.B.B. Colour guided colour image steganography. arXiv 2010, arXiv:1010.4007. [Google Scholar]
- Arora, H.; Sharma, P.K.; Mitanshi, K.; Choursia, A. Enhanced Security of Digital Picture and Text Information with Hybride Model of Hiding and Encryption Techniques. In Proceedings of the 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India, 7–9 April 202; IEEE: Piscataway, NJ, USA, 2022; pp. 1238–1241. [Google Scholar]
- Wang, C.; Ni, J. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients. In Proceedings of the 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, 25–30 March 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1785–1788. [Google Scholar] [CrossRef]
- Naz MT, S.A.; Zade, S. A New Approach for Image Steganography Using Inter Pixel Value Difference and Quantized Range Table Method. Int. J. Sci. Res. Trends 2022, 8, 898–903. [Google Scholar]
- Ilasariya, S.; Patel, P.; Patel, V.; Gharat, S. Image Steganography Using Blowfish Algorithm and Transmission via Apache Kafka. In Proceedings of the 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 20–22 January 2022; pp. 1320–1325. [Google Scholar]
- Çiftci, E.; Sümer, E. A novel steganography method for binary and color halftone images. PeerJ Comput. Sci. 2022, 8, e1062. [Google Scholar] [CrossRef]
- Harshini, K.; Naresh, B.; Sahitya, K.; Satya Vara Prasad BB, V.; Dasu, B.T. Enhanced Security with Crystography Using AES and LSB. In Confidential Computing: Hardware Based Memory Protection; Springer Nature Singapore: Singapore, 2022; pp. 177–185. [Google Scholar]
- Fadhil, A.M.; Jalo, H.N.; Mohammad, O.F. Improved Security of a Deep Learning-Based Steganography System with Imperceptibility Preservation. Int. J. Electr. Comput. Eng. Syst. 2023, 14, 73–81. [Google Scholar]
- Debnath, B.; Das, J.C.; De, D. Reversible logic-based image steganography using quantum dot cellular automata for secure nanocommunication. IET Circuits Devices Syst. 2017, 11, 58–67. [Google Scholar] [CrossRef] [Green Version]
- Abdelqader, A.; Altamimi, F. A Novel Image Steganography Approach Using Multi-Layers DCT Features Based on Support Vector Machine Classifier. Int. J. Multimed. Appl. 2017, 9, 1–10. [Google Scholar] [CrossRef]
- Anggriani, K.; Wu, N.I.; Hwang, M.S. Research on Coverless Image Steganography. Int. J. Netw. Secur. 2023, 25, 25–31. [Google Scholar]
- Tiong, L.C.O.; Kim, S.T.; Ro, Y.M. Implementation of multimodal biometric recognition via multi-feature deep learning networks and feature fusion. Multimed. Tools Appl. 2019, 78, 22743–22772. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z.; Ma, J.; Zhang, W.; Zhang, J.; Ding, Y. Robust coverless steganography using limited mapping images. J. King Saud Univ.-Comput. Inform. Sci. 2022, 34, 4472–4482. [Google Scholar] [CrossRef]
- AbdelRaouf, A. A new data hiding approach for image steganography based on visual color sensitivity. Multimed. Tools Appl. 2021, 80, 23393–23417. [Google Scholar] [CrossRef]
- Peter, G.; Sherine, A.; Teekaraman, Y.; Kuppusamy, R.; Radhakrishnan, A. Histogram Shifting—Based Quick Response Steganography Method for Secure Communication. Wirel. Commun. Mobile Comput. 2022, 2022, 1505133. [Google Scholar] [CrossRef]
- Mehta, D.; Bhatti, D. Blind image steganography algorithm development which resistant against JPEG compression attack. Multimed. Tools Appl. 2021, 81, 459–479. [Google Scholar] [CrossRef]
- Ye, H.; Su, K.; Cheng, X.; Huang, S. Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift. IET Image Process. 2022, 16, 1959–1972. [Google Scholar] [CrossRef]
- Ansari, A.S.; Mohammadi, M.S.; Parvez, M.T. A Multiple-Format Steganography Algorithm for Color Images. IEEE Access 2020, 8, 83926–83939. [Google Scholar] [CrossRef]
- The USC-SIPI Image Database. Available online: https://sipi.usc.edu/database (accessed on 13 July 2022).
- Image Databases. Available online: https://www.imageprocessingplace.com/root_files_V3/image_databases.htm (accessed on 13 July 2022).
- Rahman, Z.; Ali, Z.; Khan, I.; Uddin, M.I.; Guan, Y.; Hu, Z. Diverse image enhancer for complex underexposed image. J. Electron. Imaging 2022, 31, 041213. [Google Scholar] [CrossRef]
Name | Essential Factors |
---|---|
MSE | The MSE Mean Square Error and PSNR are inverse because if the MSE values are less than 1, there is no difference between the cover and stego images. Because MSE is used to find the difference between the stego and cover images |
NCC | Normalize Cross Correlation (NCC) is another IQAM used to analyze how cover and stego images are related. If the value of NCC is equal to 1, both images are the same; if the value is propositional to 0, then the images are different. |
SSIM | structural Similarity Index (SSIM) is used in three-part or segments Luminance, Contrast, and structural. The result of the three-part will decide the quality of both images. If all segments’ values are equal to 1, then both images are the same. |
PSNR | Peak Signal Noise Ratio (PSNR) is another quality assessment metric used for any image steganography method. It is calculated the quality and perception of any stego images. |
RMSE | Root Mean Square Error (RMSE) in distinguishing contrast between two pictures is extremely standard since it gives an enhanced nonexclusive target examination blunder in metric utilized as a piece of numerical desires. |
HA | Histogram Analysis is also an assessment concept that shows the cover and stego images histograms which can assess the changes or features of both images |
Stego keys | Stego keys also use existing methods to increase security by embedding encrypted media with secret information to obtain the message correctly [24,25,26,27]. |
Techniques Used | Uses of Data | Image Format/References |
---|---|---|
LSB algorithms and RC4 combination | PNG image as cover object and secret message (text) | PNG [11] |
The k-mean algorithm is used for training the palette. Insertion is based on left-right and top-bottom | 3 different images of 512 × 512 dimensions | PNG [4] |
Block-Entropy is used with DCT | A Grayscales image is used, which is uncompressed | JPEG [30] |
It has used the concept of palette steganography, and insertion is only one bit per pixels based on pixel indicator | A different image is used, such as a baboon, peppers of 512 × 512 | PNG [31] |
It is used the concept of value-based and or intensity-based insertion | It is used 640 × 480 dimensions, different images of the depth = 24 per pixel. | RGB/bitmap [32] |
The author used high-resolution images for insertion because its transfer payload | JPEG images of different sizes and dimensions | JPEG [33] |
In this paper, the pixel indicator method is used with LSB-modified manners | In this method, different images of 256 × 256 are used for embedding with some specific amount of secret message | Bitmap [34] |
Matrix encoding and the canny detection method used for embedding | Different dimension 100 × 100, 80 × 80, 60 × 60 images are used for secret message embedding | RGB/bitmap [35] |
The author used the concept of Lsb especially for android | MMS is used as a message bit and cover image is bitmap | RGB/bitmap [36] |
In this paper, the embedding is a two-step process for increasing security by a 2D method | AES encryption techniques are used for embedding a secret message | Bitmap Image [37] |
The author used Faye men gate for encoding and decoding the message | Reversible logic and Quantum dot cellular automata (QDCA) | Bitmap image [38] |
This paper used SVM and Multi-level DCT | DCT is used for embedding 2 bits per pixel | RGB/bitmap [39] |
Huffman code and AES algorithm for Gray images | 128 bits block size is used for embedding | Gray images/RGB [40] |
In this paper, the authors used Quotient and LSB substitution to focus on high capacity | Images are divided by 3 × 3 with no overlapped sizes, two bits of LSB are used, and a quotient is applied to the remaining 6 bits | PNG and Bitmap Images [41] |
The authors used the stego key and adaptive base image steganography concepts | Stego key is used for security, and the Multi-Level Encryption Algorithm shuffles the bits The authors also analyzed different sizes of images with different dimensions images | RGB images [42] |
limited base mapping and Coverless Image steganography | The first extraction of the statistics between robustness mapping features. The single images are used for multiple embedding secret message | RGB images [43] |
Using visual color intensity-based image steganography algorithm | Used two concepts, first different numbers of bits for color intensity channels. In this research, the focus is only is transparency | RGB/PNG [44] |
Quick response-based and Histogram shifting based steganography | Used two methods quick response and shifting. This research focuses on security | RGB [45] |
Blind Algorithm for JPEG compression attack | The paper focuses on transparency and payload with up to 8192 bits achieved | JPEG [46] |
Reversible image steganography-based image interpolation and shifting method | First, the pixel position is changed with double scrambles operation of the image block, and logistic mapping is used to diffusion the algorithm. Based on the embedding rate of 0.67, the embedding capacity is improved up to 1,586,732 bits | PNG/RGB [47] |
Techniques/Uses of Data | Image Format/ References | Measuring Algorithm | ||||
---|---|---|---|---|---|---|
Capacity | Security | Transparency | Temper Protection | Computation | ||
LSB algorithms and RC4 combination. PNG image as cover object and secret message (text) | PNG | Yes | Yes | No | Yes | No |
The k-mean algorithm is used for training the palette. Moreover, insertion is based on left-right and top-bottom. Three different images of 512 × 512 dimensions | PNG | Yes | Yes | No | No | Yes |
Block-Entropy is used with DCT. Grayscales image is used, which is uncompressed | JPEG | No | Yes | No | Yes | No |
It has used the concept of palette steganography, and insertion is only on bit per pixel based on pixel indicator. A different image is used, such as a baboon, peppers of 512 × 512 | PNG | Yes | Yes | No | No | Yes |
It is used the concept of value-based and or intensity-based insertion. It uses 640 × 480 dimensions and different images of depth = 24 per pixel | RGB/bitmap | Yes | No | Yes | Yes | No |
The author used high-resolution images for insertion because it transfers payload easily and securely, especially on Facebook. JPEG images of different sizes and dimensions | JPEG | No | Yes | No | Yes | Yes |
This paper uses the pixel indicator method with Lsb-modified manners. In this method, different images of 256 × 256 are used for embedding with some specific amount of secret message | Bitmap | Yes | Yes | No | Yes | No |
Matrix encoding and the canny detection method used for embedding. Different Dimension 100 × 100, 80 × 80, 60 × 60 images are used for secret message embedding | RGB/bitmap | No | Yes | No | Yes | No |
The author used the concept of Lsb, especially for android. MMS is used as a message bit, and the cover image is a bitmap | RGB/bitmap | No | Yes | No | No | Yes |
In this paper, embedding is a two-step process for increasing security by a 2D method. AES encryption techniques are used for embedding a secret message | Bitmap Image | No | Yes | Yes | No | Yes |
The author used Faye men gate for encoding and decoding the message. Reversible logic and Quantum dot cellular automata (QDCA) | Bitmap image | No | Yes | Yes | No | Yes |
This paper used SVM and Multi-level DCT. DCT is used for embedding 2 bits per pixel | RGB/bitmap | Yes | Yes | No | No | Yes |
Huffman code and AES algorithm for Gray images. 128 bits block size is used for embedding | Gray images/RGB | No | Yes | Yes | No | No |
In this paper, the authors used Quotient and LSB substitution to focus on high capacity. Images are divided by 3 × 3 with no overlapped sizes, two bits of LSB are used, and the quotient is applied on the remaining 6 bits | PNG and Bitmap Images | No | Yes | Yes | No | Yes |
The authors used the stego key and adaptive base image steganography concepts. Stego key is used for security, and the Multi-Level Encryption Algorithm shuffles the bits. The authors also analyzed different sizes of images with different dimensions’ images | RGB images | No | Yes | Yes | No | Yes |
Limited base mapping and Coverless Image steganography. The first extraction of the statistics between robustness mapping features. The single images are used for multiple embedding secret message | RGB images | Yes | Yes | No | Yes | No |
We are using visual color intensity-based image steganography algorithm. Used two concepts, first different numbers of bits for color intensity channels. In this research, the focus is only is transparency | RGB/PNG | Yes | No | Yes | No | Yes |
Quick response-based and histogram-shifting-based steganography. Used two methods quick response and shifting. This research focuses on security | RGB | No | Yes | No | Yes | Yes |
Blind Algorithm for JPEG compression attack focuses on transparency and payload with up to 8192 bits achieved | JPEG | Yes | No | Yes | Yes | No |
Reversible image steganography-based image interpolation and shifting method | PNG/RGB | Yes | No | Yes | Yes | No |
Images | Message Size | PSNR Values of the Proposed Algorithm | |||
---|---|---|---|---|---|
PNG | TIFF | BMP | JPG | ||
Mandrill | 12 KB | 84.321 | 83.123 | 82.212 | 85.220 |
Girl1 | 12 KB | 90.223 | 87.765 | 83.121 | 88.980 |
Peppers | 12 KB | 75.890 | 70.654 | 70.876 | 75.987 |
Lake | 12 KB | 87.098 | 79.986 | 82.097 | 84.643 |
House | 12 KB | 90.854 | 89.654 | 87.001 | 87.087 |
Tree | 12 KB | 88.001 | 87.009 | 87.091 | 87.098 |
Splash | 12 KB | 86.065 | 87.120 | 83.087 | 86.076 |
Girl2 | 12 KB | 80.008 | 81.987 | 84.986 | 86.121 |
Average of 150 images | 85.632 | 85.162 | 84.689 | 85.972 |
Images | PSNR Values of Proposed Algorithm (128 × 128, 256 × 256, 512 × 512, 1024 × 1024/12 KB) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PNG | TIFF | BMP | JPG | |||||||||||||
128 | 512 | 256 | 1024 | 128 | 512 | 256 | 1024 | 128 | 512 | 256 | 1024 | 128 | 512 | 256 | 1024 | |
Mandrill | 77.32 | 84.32 | 84.32 | 84.32 | 86.12 | 83.32 | 83.32 | 81.32 | 84.21 | 80.32 | 81.32 | 70.32 | 85.22 | 89.32 | 87.32 | 84.32 |
Girl1 | 76.32 | 88.21 | 87.22 | 89.23 | 79.31 | 81.11 | 77.09 | 82.21 | 73.12 | 81.32 | 80.32 | 74.31 | 87.32 | 83.32 | 87.32 | 81.11 |
Peppers | 74.21 | 87.31 | 84.21 | 80.91 | 74.32 | 83.22 | 82.31 | 83.32 | 74.12 | 77.22 | 71.22 | 79.23 | 86.32 | 87.21 | 77.22 | 85.32 |
Lake | 72.12 | 86.21 | 87.01 | 79.99 | 73.32 | 86 | 85.11 | 84.23 | 72.11 | 70.21 | 71.21 | 70.9 | 74.21 | 88.21 | 88.21 | 86.33 |
House | 75.21 | 86.21 | 82.23 | 88.11 | 73.21 | 85.33 | 86 | 79.91 | 72.22 | 79.01 | 77.01 | 79.9 | 82.12 | 86.01 | 89.01 | 85.19 |
Tree | 80.23 | 86.01 | 86.01 | 87.99 | 71.11 | 84 | 85.01 | 76.99 | 75.31 | 81.23 | 76.23 | 78.13 | 75.21 | 87.11 | 86.23 | 84.12 |
Splash | 89.09 | 85.21 | 83.09 | 87.99 | 75.21 | 85.21 | 85.22 | 85.11 | 79.43 | 81.11 | 76 | 77.9 | 80.23 | 88 | 86.31 | 85.32 |
Girl2 | 86.23 | 85.11 | 82.21 | 88.09 | 79.23 | 83 | 83 | 87.99 | 72.39 | 82 | 76.09 | 75.09 | 89.09 | 85.09 | 76.09 | 86.31 |
Av.of 150 images | 78.84 | 86.07 | 84.54 | 85.83 | 76.48 | 83.90 | 83.38 | 82.64 | 75.36 | 79.05 | 76.18 | 75.72 | 82.47 | 86.78 | 84.71 | 84.75 |
Images | PSNR Values of Proposed Algorithm (6, 8, 10, and 12 KB’s/512 × 512 Image) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PNG | TIFF | BMP | JPG | |||||||||||||
6 KB | 8 KB | 10 KB | 12 KB | 6 KB | 8 KB | 10 KB | 12 KB | 6 KB | 8 KB | 10 KB | 12 KB | 6 KB | 8 KB | 10 KB | 12 KB | |
Mandrill | 87.32 | 84.32 | 83.32 | 83.32 | 86.12 | 83.32 | 83.32 | 81.32 | 84.21 | 80.32 | 81.32 | 70.32 | 88.32 | 83.44 | 82.32 | 82.32 |
Girl1 | 86.32 | 82.21 | 82.22 | 80.23 | 79.31 | 81.11 | 77.09 | 82.21 | 73.12 | 81.32 | 80.32 | 76.31 | 85.32 | 82.24 | 82.22 | 80 |
Peppers | 84.11 | 84.33 | 83.21 | 80.91 | 74.32 | 83.22 | 82.31 | 83.32 | 74.12 | 77.22 | 71.22 | 79.23 | 88.21 | 85.44 | 83.21 | 80.91 |
Lake | 79.01 | 83.88 | 83.01 | 77.99 | 73.32 | 86 | 85.11 | 74.23 | 72.11 | 70.21 | 71.21 | 80.9 | 79.01 | 83.88 | 83.01 | 79.99 |
House | 85.01 | 86.21 | 81.23 | 80.11 | 73.21 | 85.33 | 86 | 79.91 | 72.22 | 79.01 | 77.01 | 79.9 | 85.02 | 86.21 | 81.23 | 80 |
Tree | 80.23 | 86.98 | 83.01 | 81.99 | 71.11 | 84 | 80.01 | 76.99 | 75.31 | 81.23 | 76.23 | 78.13 | 80.23 | 86.98 | 83.01 | 81.99 |
Splash | 89.98 | 85.21 | 82.09 | 80.99 | 75.21 | 85.21 | 79.22 | 75.11 | 79.43 | 81.11 | 76 | 77.9 | 89.78 | 85.12 | 84 | 81.99 |
Girl2 | 86.13 | 85.09 | 82.21 | 80.09 | 79.23 | 83 | 79 | 79.99 | 72.39 | 82 | 76.09 | 75.09 | 86.13 | 85.09 | 82.21 | 80 |
Av of 150 images | 84.76 | 84.78 | 82.54 | 80.70 | 76.48 | 83.90 | 81.51 | 79.14 | 75.36 | 79.05 | 76.18 | 77.22 | 85.25 | 84.80 | 82.65 | 80.90 |
Images | Message Size | PSNR Values of the Proposed Algorithm Based on Aerial and Texture Images of Different Formats (512 × 512) | |||
---|---|---|---|---|---|
PNG | TIFF | BMP | JPG | ||
Aerial 1 | 12 KB | 84.321 | 76.113 | 78.212 | 84.22 |
Aerial 2 | 12 KB | 88.223 | 77.765 | 63.121 | 85.98 |
Aerial 3 | 12 KB | 85.89 | 79.654 | 73.876 | 78.987 |
Txtr 1 | 12 KB | 79.098 | 69.986 | 77.097 | 75.643 |
Txtr 2 | 12 KB | 80.854 | 79.654 | 87.001 | 86.087 |
Txtr 3 | 12 KB | 78.001 | 87.009 | 87.091 | 87.098 |
Average of 150 images | 82.73 | 78.36 | 77.73 | 83.00 |
Image | Average Results of PSNR, Compared Proposed Algorithm with Existing Research Works Using Different Image Formats | |||||||
---|---|---|---|---|---|---|---|---|
AbdelRaouf et al. [43] | Luxi et al. [42] | Naz et al. [33] | Peter et al. [44] | Mehta et. al. [45] | Ye, H et. al. [46] | Arsyia et al. [49] | Proposed Algorithm | |
Mandrill | 68.342 | 78.043 | 79.003 | 80.324 | 83.987 | 81.098 | 84.321 | 85.001 |
Girl1 | 69.098 | 68.321 | 69.432 | 79.221 | 69.662 | 76.321 | 79.978 | 80.901 |
Peppers | 70.321 | 71.211 | 68.991 | 69.001 | 70.002 | 74.321 | 72.212 | 78.001 |
Lake | 75.009 | 73.002 | 75.221 | 75.001 | 76.779 | 79.001 | 80.221 | 81.001 |
House | 67.087 | 67.900 | 70.009 | 71.988 | 69.900 | 77.009 | 81.007 | 81.999 |
Tree | 79.876 | 79.991 | 80.002 | 81.008 | 80.321 | 79.987 | 82.009 | 83.001 |
Splash | 77.002 | 76.992 | 79.900 | 80.876 | 81.098 | 80.876 | 81.987 | 82.002 |
Average | 72.39 | 73.64 | 75.79 | 76.77 | 75.96 | 79.09 | 80.25 | 81.70 |
IQAM | Name, Dimension, and Secret Message Size. 512 × 512 and 12 KB | ||||||
---|---|---|---|---|---|---|---|
Mandrill | Girl1 | Peppers | Lake | House | Tree | Splash | |
SSIM | 0.999 | 1 | 1 | 0.999 | 1 | 0.999 | 0.999 |
MSE | 0.021 | 0.111 | 0.001 | 0.101 | 0.122 | 0.011 | 0.121 |
NCC | 0.989 | 0.999 | 0.999 | 0.998 | 0.999 | 0.899 | 1 |
RMSE | 0.025 | 0.011 | 0.125 | 0.022 | 0.011 | 0.021 | 0.111 |
Images | Security Analysis of the Proposed Algorithm using Different Formats Image (512 × 512/16 KB Message Size) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Correlation Coefficient | Quality Index | Fidelity | ||||||||||
PNG | BMP | TIFF | JPG | PNG | BMP | TIFF | JPG | PNG | BMP | TIFF | JPG | |
Mandrill | 0.999 | 0.897 | 0.876 | 0.999 | 1 | 0.866 | 0.999 | 1 | 0.999 | 0.897 | 0.988 | 0.999 |
Girl1 | 0.998 | 0.797 | 0.855 | 0.991 | 0.999 | 0.877 | 0.876 | 0.999 | 1 | 0.897 | 0.888 | 1 |
Peppers | 1 | 0.887 | 0.879 | 1 | 0.999 | 0.897 | 0.899 | 1 | 1 | 0.788 | 0.844 | 0.997 |
Lake | 0.999 | 0.889 | 0.899 | 0.999 | 1 | 0.899 | 0.899 | 1 | 0.997 | 0.876 | 0.754 | 1 |
House | 1 | 0.955 | 0.999 | 0.999 | 1 | 0.874 | 0.789 | 0.998 | 1 | 0.866 | 0.876 | 0.999 |
Tree | 1 | 0.888 | 0.898 | 0.997 | 0.999 | 0.897 | 0.888 | 1 | 1 | 0.988 | 0.999 | 1 |
Splash | 1 | 0.897 | 0.888 | 1 | 1 | 0.877 | 0.887 | 1 | 0.998 | 0.877 | 0.966 | 0.998 |
Average | 0.999 | 0.887 | 0.899 | 0.998 | 1.000 | 0.884 | 0.891 | 1.000 | 0.999 | 0.884 | 0.902 | 0.999 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rahman, S.; Uddin, J.; Hussain, H.; Jan, S.; Khan, I.; Shabir, M.; Musa, S. Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats. Sustainability 2023, 15, 4252. https://doi.org/10.3390/su15054252
Rahman S, Uddin J, Hussain H, Jan S, Khan I, Shabir M, Musa S. Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats. Sustainability. 2023; 15(5):4252. https://doi.org/10.3390/su15054252
Chicago/Turabian StyleRahman, Shahid, Jamal Uddin, Hameed Hussain, Salman Jan, Inayat Khan, Muhammad Shabir, and Shahrulniza Musa. 2023. "Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats" Sustainability 15, no. 5: 4252. https://doi.org/10.3390/su15054252
APA StyleRahman, S., Uddin, J., Hussain, H., Jan, S., Khan, I., Shabir, M., & Musa, S. (2023). Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats. Sustainability, 15(5), 4252. https://doi.org/10.3390/su15054252