Bifold Springer
Bifold Springer
https://doi.org/10.1007/s41870-022-00861-9
ORIGINAL RESEARCH
Abstract As digital images hold sensitive information Keywords Steganography Encryption Discrete wavelet
from a number of areas, such as human, medical, satellite transform Arnold map Logistic map Cryptography
and biometric, etc., they therefore require the utmost pro-
tection. These photos hold various vulnerability threats and
in this era of cloud and virtualization, to protect data from 1 Introduction
hackers, we need an efficient way to safeguard data that
would provide a hybrid type of algorithm to protect data ‘‘Image confidentiality could typically be accomplished
from multiple types of hackers. The approach is innovative through encryption to improve the privacy of digital
and safe in the sense that it has two-fold protections for the information during processing and storage’’ [1]. The digital
safety of a secret message or information. Secret message audio, video, photographs, and documents travel to their
is encrypted twice with Arnold and Logistic maps prior to respective owners via cyberspace. Unfortunately, people
transmission. The approach effectively blends the two may choose to participate along the way, and take this
aspects of visual data security with the integration of a material for them unethically. Steganography eliminates
chaotic mechanism in such a manner that optimal security these kinds of instances by restricting or reducing a third
can be obtained. The aim is to conceal a message or plain party’s ability to decode the information. Steganography is
text and at the same time protect it by encrypting hidden frequently used for cipher texts, therefore it is character-
keys and by means of DWT and a chaotic phenomenon. ized as a hidden method of communication or interaction
Therefore, by integrating these two approaches, the new with a covering and content is within the cover.
approach conceptualizes dual encryption. Numerous metric Steganography approaches are built on four pillars: confi-
studies, such as PSNR, MSE, correlation coefficient and dentiality, payload capacity, imperceptibility, and
SSIM, have been carried out for validation purposes. The resilience.
results demonstrate that the system performs well with There are two methodologies to steganography strate-
various grayscale images and outperforms cryptography gies having classified broadly into two domains one in the
and steganography alone in terms of security and spatial and another in the frequency; the least significant bit
reliability. (LSB) insertion process is fall under spatial domain cate-
gory. In LSB insertion process, data covering technique is
utilized by the last bit of the cover picture which could not
be identified naturally [2]. Wavelet Transform, Fourier
Transform with or without fractional order both and other
& Bharti Ahuja associated transform like Cosine Transform and Sine
bharti.salunke99@gmail.com
Transform are all characterized in frequency domain
Rajesh Doriya [3].Tremendous work has been carried out in the area of
rajeshdoriya.it@nitrr.ac.in
image encryption and steganography in the last decade
1
Department of Information Technology, National Institute of from which some very relevant and promising work is
Technology-Raipur, Raipur, Chhattisgarh, India listed below.
123
Int. j. inf. tecnol.
Nevriyanto et al. [4] introduced a procedure of image steganography is introduced using likewise fractal stream
steganography established on discrete wavelet transform cryptography to cover up Huffman based compressed
(DWT) and singular value decomposition. They utilized a Turkish writings. An assessment of Turkish newspaper
content document and changed over into a picture as feature writer content is obtained here in order to obtain not
watermark. Soni et al. [5] highlighted the importance of a only the alphabets, containing unusual Turkish characters,
discrete fractional Fourier transform (DFRFT) relative to but also punctuation marks, spaces, news lines, citations,
other transformations for steganography in computer and so on. As a consequence of the first phase, a reliable
vision. Frequency domain transformation may be per- Huffman encoding dictionary for 102 observable characters
formed either in Discrete Cosine Transform (DCT), DWT is constructed [12].
or even in DFRFT. Transform techniques have a smaller A method converting an image based steganography that
payload contrasted with spatial. However the frequency masks a hidden image into a cover image also proposed by
domain approach covers the sensitive information or Subhedar et al. The work states the advantage of decom-
message in to a specific frequency component efficiently position of bidiagonal singular value decomposition. And
but suffers with the downside of the increased computa- apart from this it also has perfect reconstruction, sparsity
tional cost. But because of the added advantages like high and stability that allow the transformation of frame let to be
security, stability and robustness in the frequency domain considered as an effective decomposition tool for the
strategies always attracts the researchers to do more work generation of transformation coefficients [13].
upon. Steganography using DWT has more benefits as it The adaptive pattern is used in one study proposed by
has higher compression ratios and therefore prevents Rustad et al. to execute the inverted LSB. Prior to
interference due to artifacts [6]. Also compression is an embedding the message, the bits of the content as well as
added advantage because its saves the space for storage and the container picture are counted, and the error ratio for
transform as done by Nasrullah et al. i.e. hidden message each bit combination is computed. For every 2-bit combi-
mining and image cover recovery was conducted together nation to reverse the LSB, eight patterns (000 to 111) are
in reversible data hiding technique for compression used in addition to the LSB of the container picture pixels.
encryption on the protected partition of the hierarchical tree Inverted LSB is used to reduce the error ratio for each
[7]. pattern. For each pair of bits, each pattern’s lower error
Methodologies relying on artificial neural network also ratios are put together. To incorporate the message, the bit
find applications in the field as the data recovery. Hu et al. combination with the lowest error ratio is chosen. Because
[8] recommended a novel steganography without embed- it is dependent on the assessment of the error ratio, the
ding imaging technique focused on deep convolutional optimal pair of bits may vary depending on the container
systems. They convert concealed data into a noise vector picture and message size. When evaluated on standardized
and use a verified neural system generator computation to and medically less varied images, the proposed technique is
create a transporter image based on a noise vector. No successful in increasing imperceptibility based on PSNR
change or insertion tasks are necessary during the picture and SSIM [14].
formation; the data put away in the picture can be recov- Another study, by Shah et al., provides an image
ered effectively. Predicated on the idea of deep learning, steganography system with changeable payload capacity
Duan et al. [9] introduces a new system of image based on Genetic Algorithm. The proposed system pro-
steganography dependent on the U-Net structure. A certi- vides both high imperceptibility and payload capacity. GA
fied deep neural system consolidates a concealing system is used to find the optimum parameter value to rearrange
and an extraction system at that point the sender utilizes a and change the hidden data. A unique method of the
concealing system to install the shrouded picture into variable chromosome is also suggested; the variable chro-
another full-size picture with no adjustment and to send it mosome is helpful in boosting the imperceptibility of the
back to another one. A novel steganography framework secret data modification steganography (SDMS) approach
relying on local reference edge detection method and [15].
exclusive disjunction property is given by Kumar Gaurav A similarity measure, sometimes known as an infor-
et al. [10]. mation measure, is a notion used to differentiate between
The primary difficulties of visual steganography are dissimilar items. It has been explored in several circum-
impalpability of the cover picture and no reconstruction of stances using mathematical, psychological, and fuzzy
the hidden information. To manage these difficulties, an methodologies. By merging intuitive human perception
altered picture steganography strategy dependent on DWT with a rule-based technique, Ashraf et al. created inter-
was also proposed. The system utilizes two unique mediate type-two fuzzy logic architecture (IT2 FLS) to
approaches in particular a mystery key calculation and estimate the proximity of neighboring pixels [16]. The LSB
blocking [11]. Another spatial and chaos based approach is used to incorporate the pixels in the picture
123
Int. j. inf. tecnol.
with the largest similarity scores, as calculated by the of secret image is used at varying stages i.e. Arnold map at
suggested IT2 FLS similarity metric. the very beginning for fresh secret image and Logistic map
In one study, the carrier picture is chosen such that the after the steganography on the stego output to make it more
LSBs of the secret picture and the carrier image align with stable and resistant to attackers at the transmitting end.
a greater degree of compatibility, and the concealing pro- Information security is an obvious advantage of
cedure makes insignificant variations in the resulting stego steganography; the implementation of a novel encryption
picture using a genetic method. When compared to several and chaotic embedding system meets that requirement by
current approaches, we achieved 30–40% gains with pro- boosting security with Bifold Encryption. This is the new
posed approach. It is difficult to select an appropriate cover hybrid combination of cryptography, steganography with
picture and conceal the secret data to increase impercep- chaos which gives superior results compared to many other
tibility. A genetic algorithm has been used to help in the previously proposed algorithms as depicted in result
exploration of a difficult process of choosing from billions section.
and millions of options [17]. Further the article is arranged as follows; fundamental
One more research recommended reducing the physical terms are portrayed in the second section. The method-
space on different storage devices as well as the time it ologies and procedures are elaborated in the third sec-
takes to transport data via the Internet, while guaranteeing tion. The suggested algorithm is demonstrated in the fourth
that the data is encrypted and concealed from potential section. The fifth part contains the performance parameters
attackers. There are different methods: one as Lossy with that were used. The sixth part contains the findings and
data loss and another as Lossless. One such approach is a results. The final paragraph concludes with concluding
hybridized data compression methodology that increases remarks.
security by strengthening content security using the RSA
(Rivest–Shamir–Adleman) encryption method, and it may
be employed in the development of lossy and lossless 2 Fundamental knowledge
compression techniques for steganography [18]. This
approach may be suitable to reduce the data sent with each This section briefly highlights some of the basic funda-
transfer, allowing for faster transmission when utilizing mental terms that helps in comprehending the proposed
sluggish internet or taking up less space on various storage algorithm in a better way, which includes steganography,
devices. cryptography, the term crypto steganography, DWT,
An image steganography approach that uses a variety of Arnold map, and Logistic map as well.
methods to create the protection of the hidden content by
employing an image encryption approach depending on 2.1 Steganography and cryptography
binary bit-plane decomposition is suggested by Dhawan
et al. Following that, an adaptive embedding procedure Steganography in the image is a common method for
based on the Salp Swarm Optimization Algorithm (SSOA) hiding the message or content interior into a frame. It can
is developed. It is used to maximize payload capacity for be applied to many media forms such as textual content,
edge and smooth blocks by altering various settings in the audio, photos, and videos, etc. However, text content
steganographic embedding technique [19]. The SSOA steganography is the maximum difficult size of steganog-
approach is used in this case to successfully find the edge raphy due to the loss of redundancy in textual content
as well as smoothing pieces. The modified Fuzzy Neural compared to image or audio, but still needs small storage
Network with a back propagation learning approach is then and easy communication.
used to upgrade the effectiveness of the stego picture. The Cryptography is the study and exploration of ways for
photos from the stego are then transmitted to the destina- secure communication from the perspective of outsiders.
tion via the highly secure IoT protocol. To a greater extent, conventions are developed and eval-
Contribution: To add to the current steganography uated to measure the impact of adversaries and apply to
schemes and in order to refine the results in terms of many information security applications viz. data protec-
security, the DWT technique with Arnold map and the tion, data integrity, encryption, and non-refusal [20].
logistic map encryption are introduced. The suggested As seen in Fig. 1, a blend based on both cryptography
solution is a two-fold concept to mitigate the distortion of and steganography is used here. This is known as Crypto-
the cover image and too with safeguarding the secret Steganography. Figure 2 depicts a typical block diagram of
image. The first one, known as the blocking principle using the crypto steganography process as a whole for a quick
DWT, is implemented in order to guarantee the least understanding that how the two processes combine into one
variance in the cover picture. The second, i.e. the combi- to give better security highlights. DWT, Arnold, and
nation of Arnold and Logistic encryption for the protection
123
Int. j. inf. tecnol.
combination here for the Crypto-steganography. WbH ðj; m; nÞ ¼ pffiffiffiffiffiffiffiffi f ðx; yÞbH
j;m;n ðx; yÞ ð8Þ
MN x¼0 y¼0
It has the benefit over the Fourier transform in that it col- WbD ðj; m; nÞ ¼ pffiffiffiffiffiffiffiffi f ðx; yÞbD
j;m;n ðx; yÞ ð10Þ
MN x¼0 y¼0
lects frequency as well as spatial information.
The two-dimensional wavelet transform can be repre-
sented as:
LL ¼ aðx; yÞ ¼ að xÞað yÞ ð1Þ
LH ¼ bH ðx; yÞ ¼ bð xÞað yÞ ð2Þ
HL ¼ bV ðx; yÞ ¼ aðxÞbðyÞ ð3Þ
D
HH ¼ b ðx; yÞ ¼ bðxÞbðyÞ ð4Þ
Here H, V, and D represent the Horizontal, Vertical and
Diagonal decomposition direction of the wavelet.
Illustration of the scaling and wavelet structures for two-
dimension is described below, where i = {H, V, D}:
j
aj;m;n ðx; yÞ ¼ 22 a 2j x m; 2j y n ð5Þ
j
bij;m;n ðx; yÞ ¼ 22 bi 2j x m; 2j y n ð6Þ
123
Int. j. inf. tecnol.
2.3 Arnold map xð n þ 1Þ 1 1 xð nÞ
¼ ðmod1Þ ð11Þ
yð n þ 1Þ 1 2 yð nÞ
Across The method was invented by Vladimir Arnold, who
showed its outcomes in 1967 utilizing a cat drawing [21]. Expression (11) may be converted into expression (12)
Figure 4 depicts the graphical representation of it. It is also for the estimation of fixed points as;
commonly utilized in cryptography. It is characterized as xðnÞ ¼ xðnÞ þ yðnÞðmod1Þ
[22]: ð12Þ
yðnÞ ¼ xðnÞ þ 2yðnÞðmod1Þ
123
Int. j. inf. tecnol.
123
Int. j. inf. tecnol.
123
Int. j. inf. tecnol.
123
Int. j. inf. tecnol.
256 256
PSNR ¼ 10 log10 ð14Þ
MSE
MSE is represented, mathematically as;
X
1 M 1 X
N1
2
MSE ¼ ½f 0 ði, jÞ f ði, jÞ ð15Þ
MN i¼0 j¼0
Table 5 Correlation coefficient for stego and stego encrypted image 5 Results and discussion
Correlation coefficient Stego image Stego encrypted image
The ‘‘cover image’’ is utilized as a carrier in the proposed
Horizontal 0.9714 - 0.4037 work; the secret picture is an image that should be sent
Vertical 0.9744 0.0010 through the ‘‘cover image’’ as illustrated in Figs. 7 and 8.
Diagonal 0.9531 - 0.0054 The DWT technique is for hiding a picture in a ‘‘cover
image’’ while the Arnold map is used to encrypt a secret
image. Stego-image combines the cover and the hidden
image. In the stego picture, a logistic function is used to
4 Performance parameters encrypt it once more for more security.
Figure 7 illustrates the Crypto-Chaotic Embedding
Some prominent measures, such as SSIM, PSNR, MSE, Process for test images under consideration. Here goldhill
correlation co-efficient, and, would be assessed to ensure image of the size 512 9 512 is taken as cover image and
system performance. baboon image of the size 512 9 512 is considered as the
• PSNR refers to the proportion between the highest secret image or as the message which is to be protected.
possible signal value and the noise [24], 25. To obtain a DWT is applied to the cover image and Arnold cat map is
robust system, the mean square error should be as little as applied to the secret image, then by OR operation, the
feasible, and the PSNR result should be high. The equation above two outputs are combined together. Further this
of the PSNR is represented as: combination is then divided into blocks. Thereafter IDWT
123
Int. j. inf. tecnol.
Fig. 14 Illustration of
correlation co-efficient for cover
and stego image
is implemented to get the stego picture. Finally Logistic the message which is to be protected. The process is similar
map is implemented to stego picture to get the encrypted to as explained earlier for goldhill and baboon images.
image. Figure 10 illustrates the crypto-chaotic extraction pro-
Figure 8 illustrates the Crypto-Chaotic Extraction Pro- cess for another test image of 256 9 256 sizes under
cess for test images under consideration i.e. goldhill and consideration i.e. rice and cameraman. Here also the pro-
baboon. On receiving end primarily, the stego encrypted cess is similar to as explained earlier for goldhill and
image is decrypted by logistic map to get the stego image. baboon images.
Then DWT is applied to stego image. Thereafter the cover A set of experiments were conducted from under diverse
image is taken off and at the last Arnold map is applied to carrier images over 30 in numbers to determine the effi-
get the reconstructed secret image baboon. ciency of the suggested scheme. However for illustration
Figure 9 also illustrates the crypto-chaotic embedding only 6 are considered here. Reference images are selected
process for another test image of 256 9 256 sizes under from SIPI image database [27]. Here two type of dimen-
consideration. Here rice image is taken as cover image and sions for reference images are used, 256 9 256 and
cameraman image is considered as the secret image or as 512 9 512. Following the application of the suggested
technique, the following measurements, such as MSE,
123
Int. j. inf. tecnol.
SSIM and correlation co-efficient and PSNR, are employed Funding No funding available.
to examine picture quality. The result of MSE between
Data availability No.
secret and reconstructed secret image is shown in Fig. 11
for various test images which is 0 for all also having the Declarations
PSNR to be infinite suggesting the faithful reconstruction
of the message. Conflict of interest The author declared that they have no conflict of
interest.
Outcomes of different performance metrics such as
correlation coefficient, SSIM, PSNR, MSE, and on various Ethical approval NA.
test images on 0.002 weight is depicted in Table 1. It is
important to note that all results displayed here are having Consent to participate Yes.
baboon as secret image. Further the comparison of PSNR
Consent for publication Yes.
of proposed scheme with different literature is shown in
Table 2 where baboon is taken as secret image. Graphical
comparison illustration of Table 2 is also illustrated in References
Fig. 12.
PSNR is compared with other schemes in Table 3 (on 1. Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2016)
0.0014weights). It is important to note that all results dis- Image encryption scheme for secure digital images based on 3D
played here are having cameraman as secret image. Fig- cat map and Turing machine. In Proceedings of the 2015 7th
International Conference of Soft Computing and Pattern Recog-
ure 13 also depicts the visual comparison of image from nition, SoCPaR 2015. https://doi.org/10.1109/SOCPAR.2015.
Table 3. 7492812
Tables 4, 5 and Figs. 14, 15 illustrate the correlation 2. Neeta D, Snehal K, Jacobs D (2006) Implementation of LSB
coefficient for the cover and stego pictures, with horizontal, steganography and its evaluation for various bits. In 2006 1st
International Conference on Digital Information Management,
vertical, and diagonal values given for the goldhill and ICDIM. https://doi.org/10.1109/ICDIM.2007.369349
baboon images as cover and secret respectively. It is 3. Singh G, Shrivastava S, Singh A (2015) Analytic survey on
important to remember that the correlation in the plain various techniques of image steganography. Int J Comput Appl
image is all near 1 and all near 0 in the encrypted image. 132:1. https://doi.org/10.5120/ijca2015907271
4. Nevriyanto A, Sutarno S, Siswanti SD, Erwin E (2019) Image
Based on the results, one may infer that the suggested steganography using combine of discrete wavelet transform and
cryptosystem is well-protected against statistical attacks. singular value decomposition for more robustness and higher
peak signal noise ratio. In Proceedings of 2018 International
Conference on Electrical Engineering and Computer Science,
ICECOS 2018. https://doi.org/10.1109/ICECOS.2018.8605205
6 Conclusion 5. Soni A, Jain J, Roshan R (2013) Image steganography using
discrete fractional Fourier transform. In 2013 International Con-
We proposed a Bifold protected solution for picture ference on Intelligent Systems and Signal Processing, ISSP 2013,
encryption in this research that uses a hybrid methodology https://doi.org/10.1109/ISSP.2013.6526882
6. Baby D, Thomas J, Augustine G, George E, Michael NR (2015)
that incorporates DWT, Logistic map, and Arnold map A novel DWT based image securing method using steganogra-
while covering both elements of data security i.e. cryp- phy. Procedia Comput Sci. https://doi.org/10.1016/j.procs.2015.
tography and steganography as well. This makes the sys- 02.105
tem more resilient and safe against many cryptographic 7. Nasrullah N, Sang J, Mateen M, Akbar MA, Xiang H, Xia X
(2019) Reversible data hiding in compressed and encrypted
attacks than these approaches alone. images by using Kd-tree. Multimed Tools Appl 78:13. https://doi.
The PSNR value, MSE value and histograms of both the org/10.1007/s11042-018-7130-y
cover and secret image are witnessing that the cover picture 8. Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image
and secret information bits are retrieved without error. The steganography method via deep convolutional generative adver-
sarial networks. IEEE Access. https://doi.org/10.1109/ACCESS.
correlation co-efficient results further indicate that the 2018.2852771
proposed cryptosystem is well-protected against statistical 9. Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible
attacks. The simulation results show that the strategy works image steganography scheme based on a U-net structure. IEEE
effectively with various grey scale images and outperforms Access. https://doi.org/10.1109/ACCESS.2019.2891247
10. Gaurav K, Ghanekar U (2018) Image steganography based on
the cryptography and steganography alone in terms of Canny edge detection, dilation operator and hybrid coding. J Inf
security. In future work the proposed method can be Secur Appl. https://doi.org/10.1016/j.jisa.2018.05.001
worked with the real time images with different data base 11. Kumar V, Kumar D (2018) A modified DWT-based image
of cover images with the latest data algorithms and steganography technique. Multimed Tools Appl 77:11. https://
doi.org/10.1007/s11042-017-4947-8
advances like machine learning. 12. Kasapbasi MC (2019) A new chaotic image steganography
technique based on Huffman compression of Turkish texts and
123
Int. j. inf. tecnol.
fractal encryption with post-quantum security. IEEE Access. 20. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook
https://doi.org/10.1109/ACCESS.2019.2946807 of applied cryptography. CRC Press
13. Subhedar MS, Mankar VH (2020) Secure image steganography 21. Ferdush J, Begum M, Uddin MS (2021) Chaotic lightweight
using framelet transform and bidiagonal SVD. Multimed Tools cryptosystem for image encryption. Adv Multimed. https://doi.
Appl 79:3–4. https://doi.org/10.1007/s11042-019-08221-9 org/10.1155/2021/5527295
14. Rustad S, Setiadi DRIM, Syukur A, Andono PN (2021) Inverted 22. Wang C, Ding Q (2018) A new two-dimensional map with hid-
LSB image steganography using adaptive pattern to improve den attractors. Entropy. https://doi.org/10.3390/e20050322
imperceptibility. J King Saud Univ Comput Inf Sci. https://doi. 23. Zhu S, Zhu C, Wang W (2018) A novel image compression-
org/10.1016/j.jksuci.2020.12.017 encryption scheme based on chaos and compression sensing.
15. Shah PD, Bichkar RS (2021) Secret data modification based IEEE Access. https://doi.org/10.1109/ACCESS.2018.2874336
image steganography technique using genetic algorithm having a 24. Gulve AK, Joshi MS (2015) An image steganography method
flexible chromosome structure. Eng Sci Technol Int J. https://doi. hiding secret data into coefficients of integer wavelet transform
org/10.1016/j.jestch.2020.11.008 using pixel value differencing approach. Math Probl Eng. https://
16. Ashraf Z, Roy ML, Muhuri PK, Lohani QMD (2020) Interval doi.org/10.1155/2015/684824
type-2 fuzzy logic system based similarity evaluation for image 25. Salunke BA, Salunke S (2016) Analysis of encrypted images
steganography. Heliyon. https://doi.org/10.1016/j.heliyon.2020. using discrete fractional transforms viz. DFrFT, DFrST and
e03771 DFrCT. In International Conference on Communication and
17. Shyla MK, Kumar KBS, Das RK (2021) Image steganography Signal Processing, ICCSP 2016. https://doi.org/10.1109/ICCSP.
using genetic algorithm for cover image selection and embed- 2016.7754390
ding. Soft Comput Lett. https://doi.org/10.1016/j.socl.2021. 26. Jridi M, Alfalou A (2018) Real-time and encryption efficiency
100021 improvements of simultaneous fusion, compression and encryp-
18. Wahab OFA, Khalaf AAM, Hussein AI, Hamed HFA (2021) tion method based on chaotic generators. Opt Lasers Eng
Hiding data using efficient combination of RSA cryptography, 102:59–69. https://doi.org/10.1016/j.optlaseng.2017.10.007
and compression steganography techniques. IEEE Access. https:// 27. Weber A (2020) The USC-SIPI Image Database. USC Viterbi
doi.org/10.1109/ACCESS.2021.3060317 School of Engineering. http://sipi.usc.edu/database. Accessed 20
19. Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK Sept 2020
(2021) SSII: Secured and high-quality steganography using
intelligent hybrid optimization algorithms for IoT. IEEE Access.
https://doi.org/10.1109/ACCESS.2021.3089357
123