Stegocrypt: A robust tri-stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

被引:11
作者
Alexan, Wassim [1 ,2 ]
Mamdouh, Eyad [3 ]
Aboshousha, Amr [3 ,4 ]
Alsahafi, Youssef S. [5 ]
Gabr, Mohamed [6 ]
Hosny, Khalid M. [7 ]
机构
[1] German Univ Cairo GUC, Fac Informat Engn & Technol, Commun Dept, Cairo, Egypt
[2] German Int Univ, Math Dept, Cairo, Egypt
[3] German Univ Cairo, Fac Basic Sci, Phys Dept, Cairo, Egypt
[4] Cairo Univ, Sci Fac, Phys Dept, Giza, Egypt
[5] Univ Jeddah, Khulis Coll, Dept Informat Technol, Jeddah, Saudi Arabia
[6] German Univ Cairo, Fac Media Engn & Technol, Comp Sci Dept, Cairo, Egypt
[7] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
DNA; image processing; steganography;
D O I
10.1049/ipr2.13242
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value. In the second stage, the encrypted parts are transformed into quick response codes, serving as a layer of channel coding. Subsequently, the quick response codes are decoded back into bit-streams. To enhance security, a uniquely-seeded Mersenne Twister key is generated and employed to apply DNA coding onto each bit-stream. The resulting bit-streams are then embedded in the least significant bits of the RGB channels of a cover image. Finally, the RGB channels are merged to form a single stego image. A comprehensive set of experimental analyses is conducted to evaluate the performance of the proposed secure steganography algorithm. The experimental results demonstrate the algorithm's robustness against various attacks and its ability to achieve high embedding capacity while maintaining imperceptibility. The proposed algorithm offers a promising solution for secure information hiding in the spatial domain, with potential applications in areas such as data transmission, digital forensics, and covert communication. This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value. In the second stage, the encrypted parts are transformed into quick response codes, serving as a layer of channel coding. Subsequently, the quick response codes are decoded back into bit-streams. To enhance security, a uniquely-seeded Mersenne Twister key is generated and employed to apply DNA coding onto each bit-stream. image
引用
收藏
页码:4189 / 4206
页数:18
相关论文
共 63 条
[1]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[2]  
Abdulla A.A., 2015, PHD THESIS
[3]   Digital image steganography: challenges, investigation, and recommendation for the future direction [J].
Abdulla, Alan Anwer .
SOFT COMPUTING, 2023, 28 (15-16) :8963-8976
[4]  
Alexan Wassim, 2021, 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), P77, DOI 10.1109/NICS54270.2021.9701533
[5]  
Alexan Wassim, 2021, 2021 International Conference on Microelectronics (ICM), P29, DOI 10.1109/ICM52667.2021.9664947
[6]  
Alexan Wassim, 2021, 2021 International Conference on Microelectronics (ICM), P34, DOI 10.1109/ICM52667.2021.9664961
[7]  
Alexan W., 2022, 2022 INT TELECOMMUNI, P1, DOI 10.1109/ITC-Egypt55520.2022.9855678
[8]  
Alexan W., 2021, 2021 8 NAFOSTED C IN, P177, DOI [10.1109/NICS54270.2021.9701567, DOI 10.1109/NICS54270.2021.9701567]
[9]  
Alexan W, 2019, 2019 INTERNATIONAL SYMPOSIUM ON ADVANCED ELECTRICAL AND COMMUNICATION TECHNOLOGIES (ISAECT)
[10]   AntEater: When Arnold's Cat Meets Langton's Ant to Encrypt Images [J].
Alexan, Wassim ;
Korayem, Yousef ;
Gabr, Mohamed ;
El-Aasser, Minar ;
Maher, Engy Aly ;
El-Damak, Dina ;
Aboshousha, Amr .
IEEE ACCESS, 2023, 11 :106249-106276