Abstract
Steganography is one of the leading strategy that is employed to hide restricted content into a cover media so that the person unaware of the fact can’t predict that the cover media can acquire some secret information. The effectiveness of any steganographic approach is appraised on imperceptibility of the stego-media, payload of the cover media, integrity of the secret information, security, and computational complexity. The work presented in this paper focuses on these important concerns of secured data transmission. The proposed steganographic approach uses multimedia files including animated image sequences as cover media for concealing secret messages. The entire secret information to be embedded is converted to a code using Secure Hash Algorithm-1 (SHA-1) (National Institute of Standards, and Technology (US). Technology Administration. Secure hash standard, 1993) and shared with the secret message to validate the authenticity of the transmitted secret information. The whole secret message is converted to its ASCII to embed them by replacing the least significant digit (LSD) (Liu et al. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), IEEE, 2012). The receiver validates the transmitted information with SHA-1 again generating a code, which validates with the existing code sent over from the transmitting end. The proposed algorithm is worked upon a variety of text messages with a large set of color animated image sequences as cover media and also has been tested carefully by different parametric measures. This algorithm gives robust outputs in terms of visual imperceptibility, safety, and embedding capability.
















Similar content being viewed by others
Availability of Data and Material
All the input animated sequences are available at Standard Animated GIF Dataset. https://giphy.com/
Code Availability
All the codes were developed and implemented by the authors of this manuscript. This code is not available anywhere and we do not want to upload this code before the publication of this paper. But if the code is required for review purposes it can be made available exclusively for that purpose.
References
National Institute of Standards, and Technology (US). (1993). Technology administration. Secure hash standard vol 180(1). US Department of Commerce, Technology Administration, National Institute of Standards and Technology
Liu, J., Zhou, K., & Tian, H. (2012). Least-significant-digit steganography in low bit rate speech. In Proceedings of the 2012 IEEE international conference on communications (ICC) (pp. 1133–1137). IEEE.
Basak, R. K., Dasgupta, K., & Dutta, P. (2018). Steganography in grey scale animated GIF using hash based pixel value differencing. In Proceedings of the 2018 fourth international conference on research in computational intelligence and communication networks (ICRCICN) (pp. 248–252). IEEE.
Pal, D., & Ghoshal, N. (2018). Secured and imperceptible data transmission through digital audio signal with reduced internal noise. Wireless Personal Communications, 100(2), 505–518.
Zhou, R. G., & Luo, J. (2019). A novel quantum steganography scheme based on ASCII. In Advances in Quantum Communication and Information. IntechOpen.
Delp, E., & Mitchell, O. (1979). Image compression using block truncation coding. IEEE Transactions on Communications, 27(9), 1335–2134.
Li, L., He, M., Zhang, S., Luo, T., & Chang, C. C. (2019). AMBTC based high payload data hiding with modulo-2 operation and Hamming code. Mathematical Biosciences and Engineering, 16(6), 7934–7949.
Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., & Ahmad, B. (2018). Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444–1450.
Horng, J. H., Chang, C. C., & Li, G. L. (2020). Steganography using quotient value differencing and LSB substitution for AMBTC compressed images. IEEE Access, 8, 129347–129358.
Mukherjee, N., Paul, G., Saha, S. K., & Burman, D. (2020). A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimedia Tools and Applications, 79(19), 13449–13479.
Lin, J., Qian, Z., Wang, Z., Zhang, X., & Feng, G. (2020). A new steganography method for dynamic GIF images based on palette sort. Wireless Communications and Mobile Computing, 2020.
Eastlake, D., & Jones, P. (2001). US secure hash algorithm 1 (SHA-1).
Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Information Technology and Control, 46(1), 16–36.
Amirulhaqi, A., Purboyo, T. W., & Nugrahaeni, R. A. (2017). Security on GIF images using steganography with LSB method, spread spectrum and the vigenere cipher. International Journal of Applied Engineering Research, 12(23), 13604–13609.
Hore, A., & Ziou, D. (2010). Image quality metrics: PSNR vs. SSIM. In: Proceedings of the 2010 20th international conference on pattern recognition. IEEE
Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image processing, 6(6), 677–686.
Eyssa, A. A., Abdelsamie, F. E., & Abdelnaiem, A. E. (2020). An efficient image steganography approach over wireless communication system. Wireless Personal Communications, 110(1), 321–337.
Sahu, A. K., & Swain, G. (2019). An optimal information hiding approach based on pixel value differencing and modulus function. Wireless Personal Communications, 108(1), 159–174.
Johnvictor, A. C., Rangaswamy, R., Chidambaram, G., & Durgamahanthi, V. (2018). Unsupervised optimization for universal spatial image steganalysis. Wireless Personal Communications, 102(1), 1–18.
Yesilyurt, M., & Yalman, Y. (2016). New approach for ensuring cloud computing security: Using data hiding methods. Sādhanā, 41(11), 1289–1298.
Xiang, T., Hu, J., & Sun, J. (2015). Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing, 43, 28–37.
Wu, C. C., Kao, S. J., & Hwang, M. S. (2011). A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and Software, 84(12), 2196–2207.
Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107–123.
Swain, G. (2019). Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arabian Journal for Science and Engineering, 44(4), 2995–3004.
Mielikainen, J. (2006). LSB matching revisited. IEEE Signal Processing Letters, 13(5), 285–287.
Turner, L. F. (2019). Digital data security system.
Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14(2), 253–266.
Fridrich, J., & Goljan, M. (2002, April). Practical steganalysis of digital images: state of the art. In Security and Watermarking of Multimedia Contents IV (Vol. 4675, pp. 1–13). International Society for Optics and Photonics.
Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613–1626.
Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high quality steganographic method with pixelvalue differencing and modulus function. Journal of Systems and Software, 81(1), 150–158.
Luo, W., Huang, F., & Huang, J. (2011). A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools and Applications, 52(2–3), 407–430.
Chang, C. C., Chou, Y. C., & Kieu, T. D. (2008). An information hiding scheme using Sudoku. In Proceedings of the 2008 3rd international conference on innovative computing information and control (pp. 17–17). IEEE.
Chang, C. C., Liu, Y., & Nguyen, T. S. (2014). A novel turtle shell based scheme for data hiding. In Proceedings of the 2014 tenth international conference on intelligent information hiding and multimedia signal processing (pp. 89–93). IEEE.
Standard Animated GIF Dataset. https://giphy.com/
Funding
The authors proclaim that they have not gained any funding from any institute.
Author information
Authors and Affiliations
Contributions
All the authors of this manuscript contributed in this paper to design the algorithm, to experiment the use of the algorithm in a large scale of animated image sequences and to prepare the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The author declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Basak, R.K., Chatterjee, R., Dutta, P. et al. Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm. Wireless Pers Commun 122, 1891–1920 (2022). https://doi.org/10.1007/s11277-021-08973-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08973-4