Skip to main content

Advertisement

Log in

A novel combination of information hiding and confidentiality scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to exponential technological advancement, secure transmission of multimedia content is a serious challenge. These days, securing and hiding digital information most efficiently is the focus of the digital computer world. Information confidentiality and information hiding namely steganography, are the most promising techniques that can protect digital information. In this paper, a combination of encryption and steganography is used efficiently to have a double level of security to achieve confidentiality, privacy, secrecy in addition to integrity and authentication. Firstly, encryption parameters are set by using a chaotic Lorenz system (CLS), then by using CLS encryption parameter encryption is performed on the secret image. This enciphered confidential digital medium is inserted in the cover image by using the least significant bits (LSBs) steganographic scheme. Due to the double level of security, it is hard for an eavesdropper to attack the proposed scheme. All experimental and simulation results verify the efficiency of the proposed information hiding scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Alghafis A, Waseem HM, and Khan M (2019) “A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states.” Physica A: Statistical Mechanics and its Applications: 123908

  2. Alghafis, Abdullah, Noor Munir, Majid Khan, and Iqtadar Hussain. “An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System.” International Journal of Theoretical Physics, 59, no. 4 (2020): 1227–1240.

  3. Alghafis A, Waseem HM, Khan M et al (2020) A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox. Wireless Netw. https://doi.org/10.1007/s11276-020-02363-7

  4. Alghafis, Abdullah, Faiza Firdousi, Majid Khan, Syeda Iram Batool, and Muhammad Amin. “An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing.” Mathematics and Computers in Simulation, 177, (2020) 441–466.

  5. Alharan AFH, Fatlawi HK, Ali NS (2019) A cluster-based feature selection method for image texture classification. Indonesian Journal of Electrical Engineering and Computer Science 14:1433–1442

    Article  Google Scholar 

  6. Ali, Khawaja Muhammad, and Majid Khan. “Application based construction and optimization of substitution boxes over 2D mixed chaotic maps.” International Journal of Theoretical Physics 58, no. 9 (2019): 3091–3117.

  7. Arshad U, Khan M, Shaukat S, Amin M, and Shah T (2019) “An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation.” Physica A: Statistical Mechanics and its Applications: 123458

  8. Batool, Syeda Iram, Tariq Shah, and Majid Khan. “A color image watermarking scheme based on affine transformation and S4 permutation.” Neural Computing and Applications 25, no. 7–8 (2014): 2037–2045.

  9. Campbell DL, Kang H, Shokouhi S (2017) Application of Haralick texture features in brain [18F]-florbetapir positron emission tomography without reference region normalization. Clin Interv Aging. 12:2077–2086

    Article  Google Scholar 

  10. How SW, LI JJ et al (2011) Chaotic System and Factorization based Robust Digital Image Watermarking Algorithm. Jounal of Central South University of Technology 18:116–124

    Article  Google Scholar 

  11. Hussain, Iqtadar, and Muhammad Asif Gondal. “Stego Optical Encryption Based on Chaotic Baker’s Map Transformation.” Zeitschrift für Naturforschung A 69, no. 5–6 (2014): 249–253.

  12. Hussain I, Azam NA, Shah T (2014) Stego optical encryption based on chaotic S-box transformation. Optics & Laser Technology 61:50–56

    Article  Google Scholar 

  13. Jamal, Sajjad Shaukat, Tariq Shah, and Iqtadar Hussain. “An efficient scheme for digital watermarking using chaotic map.” Nonlinear Dynamics 73, no. 3 (2013): 1469–1474.

  14. Jamal, Sajjad Shaukat, Muhammad Usman Khan, and Tariq Shah. “A watermarking technique with chaotic fractional S-box transformation.” Wireless Personal Communications 90, no. 4 (2016): 2033–2049.

  15. Jamal, Sajjad Shaukat, Shabieh Farwa, Ali H. Alkhaldi, Muhammad Aslam, and Mohammad Asif Gondal. “A robust steganographic technique based on improved chaotic-range systems.” Chinese Journal of Physics 61 (2019): 301–309.

  16. Jamal, Sajjad Shaukat, Tariq Shah, Shabieh Farwa, and Muhammad Usman Khan. “A new technique of frequency domain watermarking based on a local ring.” Wireless Networks 25, no. 4 (2019): 1491–1503.

  17. Khan, Majid, and Fawad Masood. “A novel chaotic image encryption technique based on multiple discrete dynamical maps.” Multimedia Tools and Applications 78, no. 18 (2019): 26203–26,222.

  18. Khan, Majid, and Noor Munir. “A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic.” Wireless Personal Communications 109, no. 2 (2019): 849–867.

  19. Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics, Nonlinear Dyn 76:377–382

    Article  MathSciNet  Google Scholar 

  20. Khan, Majid, and Tariq Shah. “A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics.” Neural Computing and Applications 26, no. 4 (2015): 845–855.

  21. Khan, Majid, and Hafiz Muhammad Waseem. “A novel image encryption scheme based on quantum dynamical spinning and rotations.” PloS one 13, no. 11 (2018): e0206460.

  22. Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dynamics:1795–1801

  23. Khan, Majid, Tariq Shah, and Syeda Iram Batool. “A new approach for image encryption and watermarking based on substitution box over the classes of chain rings.” Multimedia Tools and Applications 76, no. 22 (2017): 24027–24024,062.

  24. Munir N, Khan M, Wei Z et al (2020) Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. Wireless Netw. https://doi.org/10.1007/s11276-020-02361-9

  25. Shah, Tariq, and Sajjad Shaukat Jamal. “An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking.” Wireless Personal Communications 110, no. 3 (2020): 1429–1442.

  26. Shah T, Ali A, Khan M et al (2020) Galois Ring GR(23,8) Dependent 24 × 24 S-Box Design: An RGB Image Encryption Application. Wireless Pers Commun. https://doi.org/10.1007/s11277-020-07274-6

  27. Tariq S, Khan M, Alghafis A et al (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09134-8

  28. Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79:6891–6914

    Article  Google Scholar 

  29. Waseem, Hafiz Muhammad, and Majid Khan. “Information confidentiality using quantum spinning, rotation and finite state machine.” International Journal of Theoretical Physics 57, no. 11 (2018): 3584–3594.

  30. Waseem, Hafiz Muhammad, and Majid Khan. “A new approach to digital content privacy using quantum spin and finite-state machine.” Applied Physics B 125, no. 2 (2019): 27.

  31. Waseem HM, Khan M, and Shah T (2018) “Image privacy scheme using quantum spinning and rotation.” Journal of Electronic Imaging 27, no. 6: 063022

  32. H. M. Waseem, A. Alghafis and M. Khan, “An Efficient Public Key Cryptosystem Based on Dihedral Group and Quantum Spin States,” in IEEE Access, vol. 8, pp. 71821–71,832, 2020, doi: https://doi.org/10.1109/ACCESS.2020.2987097.

Download references

Acknowledgements

One of the author Dr. Sajjad Shaukat Jamal extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R. G. P. 1/234/41.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M., Jamal, S.S. & Waqas, U.A. A novel combination of information hiding and confidentiality scheme. Multimed Tools Appl 79, 30983–31005 (2020). https://doi.org/10.1007/s11042-020-09610-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09610-1

Keywords

Navigation