1 Introduction

Information security focuses on strengthening private content, but the field has been developed with the most recent digital communication discipline maturation. The terminologies ‘Crypto’ and ‘Stego’ are two substantial proficiencies used for data transformation and content concealment on standard and biomedical images [1]. The proficiency Steganography pretends a vital role in hiding confidential information through data hiding techniques. It can be achieved by storing the secret code in digital images, audio, or video files so that intruders do not estimate the secret code's existence [2, 3]. The practice of covering the secret code in a digital medium such as files, images, audio, or video files is referred to as the “Content Embedding” operation [4,5,6].

The development of Steganography makes it a robust mechanism to protect secret code, especially the data of telesurgery, telediagnosis, and tele-consulting over the network channel. The advancement of this content concealment practice leads to image analysis (steg-analysis) schemes [7, 8] that are similar for all the content concealment [9, 10] schemes. Several methods of stego principles are introduced [11,12,13] and are grouped into two significant cases based on their domain of the cover (input) images, which are spatial [14,15,16] and frequency [17,18,19]. In the spatial domain, the encrypted secret code is concealed in the pels of the input image by applying Least Significant Bit substitution [20,21,22], run-length [14, 23], PVD [24], reversible [12, 15], mod [25] and lossless schemes for data hiding. In the frequency domain, the secret content is stored in the input image's transformed coefficients using the domain converters such as DCT and DWT [26, 27]. In the LSB procedure, random and raster scan schemes are implemented to hide the secret code over the image pels. The random scan is preferred more than the raster scan because of its content extraction complexity.

An Optimal Pixel Adjustment Process (OPAP) to increase the content embedded Image's value by simple LSB substitution method is stated by Chan et al. [4]. The count of bits to be embedded on each of the image pels would get decided by the adjustment strategy. As a result, it cumulates merely the count based on the neighboring pels. An LSB substitution strategy using the raster scan method to improve stego-image is stated by Yang et al. [22]. The secret code has been processed before the content concealment process. Another embedding procedure using the Bishop Tour scheme of the chess game is stated by Bala Krishnan et al. [28], in which the content embodiment could be achieved by following the black and white bishop tour principle. A random way to select the Image pels for secret code embedding has been proposed by Provos et al. [17]. Another content embedding practice using random fashion has been stated by Tuomas Aura [23], which follows the SHA and stego fundamental principles to produce a series of unique pel locations over the Image for content concealment. Another LSB with Queen tour of chess game-based embedding scheme is stated by Manikandan et al. [29], which offers content embedding by following Queen placement pattern in a 8 × 8 chessboard. All the existing information hiding principles focused only on the pixel accessing order on the cover image [4]. There is no focus on the implementation of cryptographic implementation on cover images before the secret content embodiment process, which would be a significant limitation on the existing principles [13, 17, 25, 29].

The authors of the proposed model offer and exhibit a novel approach of secret content embodiment in the scrambled DICOM images in this anticipated work. For pels identification, the Queen Traversal pattern of the chess game is followed. The result has been enforced to attain massive complexity and a higher payload during the illegal content extraction. The cover DICOM image has been partitioned into an equal number of smaller blocks, subjected to the scrambling process by following the Sudoku pattern. During the secret medical data embedding practice, the tour patterns have been implemented to locate the Image's pels. The LSB substitution scheme embeds the secret content and the final descrambling results in the DICOM stego image. This proposed system's implementation results in the least Means Square Error (MSE) and maximum Peak Signal to Noise Ratio (PSNR) value for the stego DICOM images. The best traversal pattern for locating the pels and Image scrambling and descrambling patterns is kept as the key (secret) for content extraction.

2 Related Work

A variety of techniques has also been suggested on Steganography and Sudoku solver over the past. The methods are followed for information concealment on digital images, which grant lossless image compression.

2.1 Sudoku Pattern for Image Scrambling

An efficient image scrambling approach using Sudoku pattern and Latin squares is presented by Wu et al. and Zhang et al. [30,31,32]. The scrambling principle performs Image scrambling through Shuffling and Sudoku patterns, and it offers the reverse of the Sudoku and Shuffling pattern for image reconstruction. The term ‘Sudoku’ is the abbreviation of ‘Sunji wa dokushin ni kagiru’ from the Japanese language. The technique Sudoku refers to a puzzle based on numbers; generally, it contains a grid with 9 × 9. The grid is then separated into nine 3 × 3 sub-blocks. The Sudoku solver's theme is to arrange the grids using digits ranging from 1 to 9, in the behavior that there are no repetitive digits in any single column, row, and block of the whole puzzle. A sample puzzle of Sudoku and its solved result is stated in Fig. 1.

Fig. 1
figure 1

Sudoku question and its result. a Sudoku question, and b solved Sudoku puzzle

2.1.1 Sudoku Matrix Definition

A ‘M × M’ matrix is a Sudoku matrix (SM) if its elements satisfy all three constraints that matrix elements in any row and any column, and in any m × m block contains exact M digits from 1 to M.

A Sudoku matrix of order ‘M × M’ satisfying the definition of SM has the properties together with, but not restricted to the states listed below.

  • The ‘M’ elements within each row, column, and block of the matrix (Sudoku puzzle) is a permutation of the natural number sequence {1, 2, … M}

A subset of ‘MxM’ matrices of the Sudoku puzzle can be generated perimetrically [33]. It is noticeable that the above stated three properties are directly taken from the description of a Sudoku matrix.

The authors Hemanth et al. [34] presented a new approach to enhancing image steganography systems through the transforms domain. An approach for secret content embedding through contours has been presented by the authors Manikandan et al. [35]. The steganography principle on video has been presented by the authors Manisha et al. [36], in which the authors presented a two-level security model for secret data hiding process on videos. The authors Ansari et al. [37] presented a comparative study model for utilizing various steganography applications. Another approach stated by the authors Manikandan et al. [38] to hide Image over images. The above-stated model embeds the Image on another image, and at the receiver end, the embedded Image could be extracted without loss. An approach of Steganography using fractal set has been stated by Mohammad Alia et al. [39]. It offers an improved steganography model for the embodiment of secret content on digital images.

3 Proposed Methodology and Its Implementation

For implementing the proposed Queen Tour Based Content Embedding (QTBCE) technique, five different images with resolution ‘lxm’ have been taken as inputs, where l = m for a square image and l = m = 1200. As for implementing the proposed model, the image dimension's value has been considered 1200 × 1200, with a resolution of 300 dpi. The input cover images are stated in Fig. 2i–v.

Fig. 2
figure 2

Cover images for QTBCE scheme: i head, ii brain, iii heart, iv neck, and v feet

The proposed technique starts with the image segmentation process, in which the whole image is sub-divided into blocks of equal size for the scrambling process. The scrambling process works on the principle of the Sudoku game. The block diagram of the proposed QTBCE scheme is stated in Fig. 3.

Fig. 3
figure 3

Proposed queen tour based content embedding (QTBCE) system

The cover image ‘ci’ used for content concealment is enciphered using an encryption key. The Sudoku based scrambling process is to be followed for the enciphering principle because of its minimal computational complexity and efficiency. The execution pattern of the proposed methodology is stated in Sect. 3.3.

The scrambled Image has been broken into unique size blocks over 8 × 8 for the content concealment process and shown in Fig. 4. The concealment's secret code has been divided into three variable-length data vectors: SC1, SC2, and SC3, to distribute the channels' secret code. The relation between the data vectors is SC1 = TL/8, SC2 = (3 × TL)/8, and SC3 = TL/2, where TL is the secret code's length embedding process.

Fig. 4
figure 4

The procedure of secret code concealment in a scrambled image

The secret content (i.e.) the medical history of the patient is subjected to the concealment process. It is performed by locating the pels in the image channels. The pels selection process follows the Queen Traversal of Chess game principle in 8 × 8 block, and the procedure is stated in Fig. 5. The Least Significant Bit (LSB) substitution procedure embeds the secret code in the image blocks.

Fig. 5
figure 5

Pel accessing order of queen traversal

The secret code gets embedded in all the image channels, such as red, green, and blue. The data vector SC1 gets embedded in the red channel blocks, SC2 in the green channel blocks, and SC3 on the blue channel blocks and the principle is stated in Fig. 6.

Fig. 6
figure 6

Color channels and their corresponding secret code streams

The content embodiment in all the blocks follows the Queen Traversal principle, as stated in Fig. 5. As per the scheme, the 8 × 8 block contains 8 non-attacking queens. There may be multiple choices for placing the non-attacking queen in the 8 × 8 chess game block. In our proposed scheme, the non-attacking queens' location is “8d 7f 6h 5b 4g 3a 2c 1e”. The first queen's placement in the location “8d” offers four locations, namely “8e–8f–8g–8h” for the content embodiment, and through this queen placement, 8-bits of data gets embedded. The eight queens offer ‘28’ locations for the content embodiment, which supports ‘56’ bits of content embodiment in a single block. Table 1 shows the locations of the 8-queens in an 8 × 8 chess block and its corresponding areas for the content embodiment process.

Table 1 Queen placement and its corresponding locations for the data embedding process

3.1 Algorithm for Queen Traversal Based Secret Code Substitution Process in the Color Image

Inputs

  1. 1.

    Secret Content (SC) in bits

  2. 2.

    Cover Image

  3. 3.

    Scrambling Key (SK)

  4. 4.

    Queen Traversal Pattern

Output

  1. 1.

    Stego Image (SI)

Algorithm

figure g

The content from SC1 gets embedded in EI's red channel, content from SC2 gets embedded in the green channel of EI, and SC3 on the blue track of EI.

Step 9: Apply the descrambling process in the EI to obtain the Stego Image ‘SI.’

3.2 Algorithm for Queen Traversal Based Secret Code Extraction Process in Color Image Inputs

  1. 1.

    Stego Image (SI) containing the embedded Secret Content (SC)

  2. 2.

    Scrambling Key

  3. 3.

    Queen Traversal (QT) Pattern

  4. 4.

    Length of the Data Vectors SC1, SC2, and SC3 and store it in L1, L2, and L3

Output

Secret code stream of length (TL) in bits.

Algorithm

figure h

3.3 Execution of the Proposed Methodology

The proposed scheme's execution procedure is stated in Fig. 3, and the workflow of the scrambling and embedding process is presented in Sect. 3.1 algorithmically. The cover image is forwarded to the scrambler to generate the encrypted Image. For the procedure, the Image could be sub-divided into blocks of the same size. A systematic and efficient process of blocks could be performed to generate the encrypted Image. The procedure for the encrypted or scrambled image generation could be the Sudoku technique. For the Sudoku-based scrambling process, the sub-divided blocks are subjected to the assignment of unique numbers, and by following the Sudoku pattern, the numbered blocks are then rearranged; as a result, an efficient scrambled or encrypted image has been obtained.

All the stego principles implement the content concealment process over the cover image only. The proposed scheme offers an efficient multilevel security platform over the secret content by storing the secret content on an encrypted image. The content concealment process offers a proficient traversal scheme for locating the pels over the Image for the content embodiment process, and the Queen Traversal pattern is stated in Fig. 5. The secret content gets embedded in all the channels of the Image. The secret code gets subdivided into three data vectors for improving the level of confidentiality over the content. The existing content schemes hide the secret code sequentially, whereas the proposed system performs a data dividing scheme for separating the secret code. The codes are stored in the data vectors SC1, SC2, and SC3. The channel accessing procedure of the data vectors is stated in Fig. 6. The proposed scheme offers six different strategies for storing the contents over the Image, and the options are indicated in Table 2.

Table 2 Data vector schemes and their corresponding color channels

As per the mentioned schemes in Table 2, Scheme A hides the content of SC1 in the red channel, and SC2 and SC3 load the content in green and blue channels, respectively. In order to improve the chaotic level of content hiding, multiple schemes are proposed, and the order of the data vectors SC1, SC2, and SC3 are distorted in each of the methods for accessing the color channels. The content extraction process at the receiver end is stated in Sect. 3.2, and the procedure starts by scrambling the received Image. And in the scrambled Image, the proposed queen traversal is applied for locating the pels. For the secret content extraction, the traditional LSB extraction could be followed in all the image color channels according to the schemes depicted in Table 2. The proposed model could be incorporated over the healthcare services domain to transfer the patient details effectively. The medical practitioner could utilize the proposed model to effectively share the patient details and the medical reports to other medical practitioners and the authorized recipients.

4 Experimental Observations

Process the digitized Image encompasses numerous metrics to quantify the image properties. The MSE and PSNR are such metrics applied to appraise the quality and error rate between the images. The former is almost inversely proportional to the latter. Other quantifying metrics such as compression ratio, content embedding, and extraction time also plays a vital role.

4.1 Mean Squared Error (MSE)

It is to identify the squares of the error between two images. Usually, it is a set of numerical values, and its computing equation is

$${\text{MSE}}\;\left( {{\text{Color}}\;{\text{Image}}} \right) \, = \frac{1}{{\begin{array}{*{20}c} {N^{2} } \\ \\ \end{array} }}\mathop \sum \limits_{{{\text{i}} = 1}}^{{\text{N}}} \mathop \sum \limits_{{{\text{j}} = 1}}^{{\text{N}}} [\left( {{\text{R}}\left( {{\text{i}},{\text{j}}} \right) - {\text{R}}^{*} \left( {{\text{i}},{\text{j}}} \right)} \right){ }^{2} + \left( {{\text{G}}\left( {{\text{i}},{\text{j}}} \right) - {\text{G}}^{*} \left( {{\text{i}},{\text{j}}} \right)} \right){ }^{2} + \left( {{\text{B}}\left( {{\text{i}},{\text{j}}} \right) - {\text{B}}^{*} \left( {{\text{i}},{\text{j}}} \right)} \right){ }^{2} ] \ldots ({\text{e}})$$

where CImage and SImage represent the cover and stego image, respectively. The R(i, j), G(i, j), and B(i, j) denotes the pixels (Red, Green, and Blue) in locations(i, j) of the CImage, R′ (i, j), G′ (i, j) and B′ (i, j) represents the pixels of the SImage, and an N × N denotes the resolution of the images.

4.2 Peak Signal to Noise Ratio (PSNR)

The ratio between signal variance and reconstruction error variance is computed through the PSNR value, and it can be calculated through the following expression.

$$PSNR = 10{\text{log}}_{10} \frac{{255^{2} }}{{{\text{MSE}}}}\left( {\text{f}} \right)$$

4.3 Content Embedding and Extraction Time

Any compression system uses one of the enciphering principles for generating the cipher code for the input content. The cipher generation practice is very crucial for the success of the system. It involves the representation of the input content in a form that is appropriate for storage and transmission. The time taken to accomplish this operation is denoted as embedding time, and the reverse is the extraction time. The proposed QTBCE approach has been implemented, and tests are conducted using the medical images shown in Fig. 2.

The proposed approach performs the content embedding process on the scrambled Image. For the content concealment, the Queen Traversal pattern could be followed for locating the pels over the Image's color channels. The input cover Image dimensions were 1200 × 1200; through this Image, 109,200-bits secret content has been taken for embedding practice. The experiments' outcomes are shown in Fig. 7, displaying the cover image and its corresponding scrambled Image without content concealment and the scrambled Image with secret content. After the content concealment process, the Image would be subjected to a descrambling process to obtain the stego image, which looks similar to the cover image.

Fig. 7
figure 7

Cover Image with its corresponding scrambled image and stego image

The difference between the cover image and the stego image could be identified through the MSE and PSNR values. In the proposed approach, six distinct schemes for content embodiment are introduced and are stated in Table 2. The following Table 3 shows the cover and stego images' comparison outcomes, respectively, according to the schemes.

Table 3 Comparison of cover and stego images according to the schemes

It is to be denoted that Table 3 shows the outcomes of the comparison of the stego image with its corresponding cover image. The MSE value states that the variation between the images is very low. The similarity between the images is at an acceptable rate, which is observed through the PSNR value. The comparisons between the proposed schemes (Scheme A to F) based on the observed PSNR values are presented in Fig. 8. The proposed QTBCE, besides furnishing a substantial betterment in procedures (A to F), offers an additional feature of multilayer security, as data embedding using the methods has been carried out by following Queen Traversal in the scrambled images, and the descrambling generates final stego image. This means an opponent must know the scrambling key for obtaining the scrambled Image besides knowing Queen Traversal and the schemes (Scheme A to F) pattern to get back the secret content from the stego image.

Fig. 8
figure 8

Comparison of the proposed system schemes (A to F)

5 Significance of the Proposed Approach

The proposed QTBCE system applies three mechanisms for influencing content confidentiality. They are.

  • Scrambling and De-scrambling of images (Image Encryption).

  • Secret content substitution by Queen Traversal pattern for locating the pels.

  • Secret content partitioning along with Schemes (A to F) for embedding the content in color channels.

All the traditional stego principles, the pels accessing order, hold the lock of secret content extraction. Still, the proposed system maintains the first lock at the image encryption technique, the second lock at the Queen Traversal based pels accessing order, and the final lock is the content extraction schemes.

6 Security Analysis

The proposed approach comprises the encryption principle on Image to obtain an enciphered image and Steganography principle for hiding a secret content in an enciphered image. The proficient footprints implied in the proposed system is

  • The cover image gets reordered or scrambled by applying the Sudoku Pattern key.

  • The secret content is partitioned into distinct size vectors, which are located for color channels.

  • The Scrambled Image is subjected to LSB substitution by following the proposed Queen Traversal schemes.

  • Descrambling on the content embedded Image would generate the final stego image.

The scrambling key and the traversal principle, and data vectors partitioning schemes are needed to get back the confidential medical data from the DICOM images at the receiver end. Hence the proposed system offers a multilevel level of security to the confidential medical data of the patients.

7 Conclusions

An efficient approach with a high ability to accomplish the secured data hiding has been presented in this paper. The existing steganography models perform embodiment on the cover image alone, whereas the proposed model works with the scrambling and then embedding process. Initially, the cover image gets enciphered by applying a Sudoku based scrambling mechanism. The outcome of the scrambling would serve as a base for the content concealment process. The secret code gets partitioned into distinct data vectors for the embedding procedure and the Queen Traversal pattern for locating the pels over the image channels. The secret content embodiment is carried out in the encrypted Image. The Image is subjected to a descrambling process to obtain the stego image; the system offers a high protection level to the secret content without complexity. From the experimental observations, it is evident that the proposed scheme provides a good quality of stego images with multilevel security, which makes the system more suitable for convert communications. The implementation of traversal patterns on videos for data embodiment would be the future direction of this research work.