RGB Intensity Based Variable-Bits Image Steganography

Similar documents
Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Pixel Indicator Technique for RGB Image Steganography

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Dynamic Collage Steganography on Images

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A New Image Steganography Depending On Reference & LSB

Analysis of Secure Text Embedding using Steganography

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

An Enhanced Least Significant Bit Steganography Technique

A Comprehensive Review on Secure Image Steganography

Steganography using LSB bit Substitution for data hiding

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

LSB Encoding. Technical Paper by Mark David Gan

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

A New Steganographic Method for Palette-Based Images

An Alternative Approach of Steganography using Reference Image

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

A Study on Image Steganography Approaches in Digital Images

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

HSI Color Space Conversion Steganography using Elliptic Curve

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

An Implementation of LSB Steganography Using DWT Technique

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

An Integrated Image Steganography System. with Improved Image Quality

CSE 3482 Introduction to Computer Security.

Enhance Image using Dynamic Histogram and Data Hiding Technique

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

Hiding And Encrypting Binary Images Using A Different Approach

Resampling and the Detection of LSB Matching in Colour Bitmaps

Hiding Image in Image by Five Modulus Method for Image Steganography

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

FPGA implementation of LSB Steganography method

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

An Improvement for Hiding Data in Audio Using Echo Modulation

Image Steganography with Cryptography using Multiple Key Patterns

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Assured Supraliminal Steganography in Computer Games

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Study of 3D Barcode with Steganography for Data Hiding

Effective and Secure Method of Color Image Steganography

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Comparative Analysis of Hybrid Algorithms in Information Hiding

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Webpage: Volume 4, Issue VI, June 2016 ISSN

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator

Sterilization of Stego-images through Histogram Normalization

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Data Hiding Using LSB with QR Code Data Pattern Image

ELTYEB E. ABED ELGABAR

A Study on Steganography to Hide Secret Message inside an Image

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACING METHOD

Performance Improving LSB Audio Steganography Technique

Digital Watermarking Using Homogeneity in Image

REVERSIBLE data hiding, or lossless data hiding, hides

PRIOR IMAGE JPEG-COMPRESSION DETECTION

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

An Overview of Image Steganography Techniques

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Watermarking patient data in encrypted medical images

Colored Digital Image Watermarking using the Wavelet Technique

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Investigation of Various Image Steganography Techniques in Spatial Domain

A Proposed Technique For Hiding Data Into Video Files

Techniques of Image Mosaicing for Steganography

A Novel Implementation of Color Image Steganography Using PVD

Improved Detection of LSB Steganography in Grayscale Images

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Vernam Encypted Text in End of File Hiding Steganography Technique

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Chapter 4 MASK Encryption: Results with Image Analysis

A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission

SECURE IMAGE STEGANOGRAPHY USING CRYPTOGRAPHY AND IMAGE TRANSPOSITION ABSTRACT

SECURE IMAGE STEGANOGRAPHY USING CRYPTOGRAPHY AND IMAGE TRANSPOSITION ABSTRACT

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Application of Histogram Examination for Image Steganography

An Improved LSB based Steganography Technique for RGB Color Images

Image Compression Supported By Encryption Using Unitary Transform

A New Representation of Image Through Numbering Pixel Combinations

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Introduction to Audio Watermarking Schemes

Transcription:

RGB Intensity Based Variable-Bits Image Steganography Mohammad Tanvir Parvez and Adnan Abdul-Aziz Gutub College of Computer Sciences & Engineering King Fahd University of Petroleum & Minerals, Dhahran 31261, Saudi Arabia {tparvez, gutub}@kfupm.edu.sa Abstract In this paper, we present a new algorithm for RGB image based steganography. Our algorithm introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel based on the actual color values of that pixel: lower color component stores higher number of bits. Our algorithm offers very high capacity for cover media compared to other existing algorithms. We present experimental results showing the superiority of our algorithm. We also present comparative results with other similar algorithms in image based steganography. Keywords: Steganography, RGB image, cryptography, information hiding. 1. Introduction Steganography deals with embedding information in a given media (called cover media) without making any visible changes to it [1]. The goal is to hide an embedded file within the cover media such that the embedded file s existence is concealed. Image based steganography uses images as the cover media. Several methods have been proposed for image based steganography, LSB being the simplest one. Techniques involving bitmap images (RGB images) as cover media use single or multi-channel hiding, RNG or color cycle methods [2] etc. Gutub et al [3] describes the pixel indicator technique where one channel is used to locate the channel to store data. In this paper, we propose a new technique for RGB image steganography, where color intensity (values of R-G-B) is used to decide the no of bits to store in each pixel. Channels containing lower color values can store higher no of data bits. The sequence of channels is selected randomly based on a shared key. Our technique ensures a minimum capacity (as opposed to [3]) and can accommodate to store large amount of data. Experimental results show that our algorithm performs much better compared to the existing algorithms. Our algorithm can also be used to store fixed no of bits per channel, but can still offer very high capacity for cover media. The rest of the paper is organized as follows. Section 2 deals with a brief discussion of the algorithm in [3]. Section 3 discusses our new algorithm. Section 4 presents the detailed experimental results and comparisons. Finally, section 5 is the conclusion. 2. Review In this section, we review the pixel indicator technique in [3]. The pixel indicator technique uses the least two significant bits of one of the channels from Red, Green or Blue as an indicator for existence of data in the other two channels. The indicator channels are chosen in sequence, with R being the first. Table 1 shows the relation between the indicator bits and the amount of hidden data stored in the other channels. Table 1: Relation between the indicator bits and the amount of hidden data. Indicator Channel 1 Channel 2 bits No hidden data No hidden data 1 No hidden data 2 bits of hidden data 1 2 bits of hidden No hidden data data 11 2 bits of hidden data 2 bits of hidden data The disadvantage of the algorithm in [3] is that the capacity depends of the indicator bits and based on the cover image, the capacity can be very low. Also, the algorithm in [3] uses fixed no of bits per

channel (2 bits) to store data and the image may get distorted if more bits are used per channel. The algorithm we propose in this paper, does not suffer from these problems. Our algorithm guarantees a minimum capacity for every cover image and the number of bits stored in each channel varies depending on the intensity. This can give very high capacity for some of the cover images. In section 4, we present experimental results supporting our claim. 3. The algorithm (a) (b) (c) (d) Figure 1: Effect in colors for changes in the Red values. In this section, we briefly outline our proposed algorithm for RGB image based steganography. The idea behind our algorithm is that, for insignificant colors, significantly more bits can be changed per channel of an RGB image. Figure 1 shows one example. In (a) the color is WHITE (R=255, G=255, B=255). In (b), we only change the last 4 bits of R to zeros, resulting in a color where distortion can be noticed. In (c), the color component is same as (a), except that R = 55. In (c), we again set the least 4 bits of R to zeros, resulting in a color which seems to be same as (c). Our idea is that, lower color-value of a channel has less effect on the overall color of the pixel than the higher value. Therefore, more bits can be changed in a channel having low value than a channel with a high value. Therefore, we propose the following algorithm. Use one of the three channels as the indicator. The indicator sequence can be made random, based on a shared key between sender and receiver. Data is stored in one of the two channels other than the indicator. The channel, whose color value is lowest among the two channels other than the indicator, will store the data in its least significant bits. Instead of storing a fixed no of data-bits per channel, no of bits to be stored will depend on the color value of the channel. The lower the value, the higher the data-bits to be stored. Therefore a partition of the colorvalues is needed. Through experimentations, we show that optimal partition may depend on the actual cover image used. To retrieve the data, we need to know which channel stores the data-bits. This is done by looking at the least significant bits of the two channels other than the indicator: o If the bits are same, then the channel following the indicator in cyclic order stores the data. o Otherwise, the channel which precedes the indicator in cyclic order stores the data. Here, the cyclic order is assumed to be R-G-B-R- G-B and so on. The appropriate bits can be set while the data is stored. Figure 2 shows the encoding (at sender s side) and decoding (at receiver s side) part of our algorithm in flow charts. Note that, it is assumed that a shared key and partition scheme is already agreed upon by the two parties. Figure 3 demonstrates one example of storing data bits in a channel. In step 1, the indicator channel (here G) is selected randomly. In step 2, the data channel is chosen (R). In step 3, no of data bits to store is determined from the current channel value and partition scheme. Step 4 stores the data bits and step 5 modifies the other channel (B) LSB, which is used while retrieving the data. 3.1. Partition schemes In our algorithm, a partition scheme is defined as a monotonically decreasing sequence [a i ], i = 1 to 8.

Assume that the color value of a channel is c. Then that channel with value c stores i no of data bits if c >= a i and for all j, j < i, c < a j. For correctness of the algorithm, we only use valid partitions schemes. We define a valid partition scheme as follows: let [a i ] be a partition scheme where lower i bits of a i is all. Let [b i ], i = 1 to 8, be another sequence, where b i is generated by setting the lower i bits of a i all 1. If a i > b i+1, i = 1 to 7, then [a i ] is a valid partition scheme. This simple condition ensures that the same no of data bits are read from a channel in the receiver s side as stored in the sender s side. Figure 2b: Flow charts of the decoding part of our algorithm. R G B 82 45 91 1 82 45 91 2 82 45 91 3 111 45 11111 4 11111 45 11111 93 45 91 5 11111 45 1111 Figure 3: An example of hiding data bits inside a channel. Figure 2a: Flow charts of the encoding part of our algorithm. 4. Experimentations We implemented our algorithm in MATLAB 27 and carried our experimentations with different cover images and data files exploring different values for shared keys and partition schemes. Here, we only present the results obtained using the cover image and the data file as shown in Figure 4. Figure 5 shows the stego files for 4 different partition schemes. The value of the key was 17 and

the indicator sequence was chosen randomly using this shared key. 5 1 15 2 25 Image size: 64 X 48, Bit depth: 24 No of pixels = 372 (a) Cover Image 3 35 4 45 1 2 3 4 5 6 Pixels utilized in cover media: 38364 Partition Scheme:[256, 256, 256,,,,, ] (c) Constant 4 bits per channel Image size: 15 X 117, Bit depth: 24 Data length = 15896 bits (b) Data File (a bitmap) Figure 4: Cover media and data file used in the experimentations. 5 1 15 2 25 3 35 5 1 15 2 25 3 35 4 45 1 2 3 4 5 6 Pixels utilized in cover media: 5939 Partition Scheme: [256, 256,,,,,, ] (a) Constant 3 bits per channel 5 1 15 2 25 3 35 4 45 1 2 3 4 5 6 Pixels utilized in cover media: 4161 Partition Scheme: [256, 256, 96,,,,, ] (b) 3 to 4 bits per channel 4 45 1 2 3 4 5 6 Pixels utilized in cover media: 35791 Partition Scheme: [256, 256, 256, 48,,,, ] (d) 4 or 5 bits per channel Figure 5: Stego files for 4 different partition schemes. The same set of images were used to evaluate the algorithm in [3], the pixel indicator technique. Table 2 shows the comparative results of the two algorithms. Table 2 clearly shows that, intensity based variable-bits algorithm clearly performs better than the pixel indicator algorithm in terms of capacity utilizations. For comparison purpose, we have modified the pixel indicator algorithm to store up to 3 or 4 data bits per channel. But this modification leads to visual distortions to the cover image. Our algorithm ensures a minimum capacity for any cover image, whereas for pixel indicator method, the capacity may sometimes become very low. As an example, for the cover image and data file of Figure 6, our algorithm uses only 16.5% of the capacity of the cover image (for fixed 3 bits data per channel), whereas pixel indicator method cannot store the data file due to capacity shortage!

Table 2: Comparison of performance of two steganography algorithms. Technique No of data bits per channel (bits) No of pixels of cover media utilized (pixels) No of pixels of cover media utilized (percentage) Intensity Based Variable-Bits Pixel Indicator 3 5939 16.58% 3 or 4 4161 13.37% 4 38364 12.49% 4 or 5 35791 11.65% 2 + 2 77578 25.25% 3 + 3 5951 19.22% 4 + 4 44687 14.55% Image size: 64 X 48, Bit depth: 24 No of pixels = 372 (a) Cover Image Image size: 15 X 117, Bit depth: 24 Data length = 15896 bits (b) Data File (a bitmap) Figure 6: Capacity variations with different cover media. Figure 7 9 show the color histogram plots for the cover and stego images for all three channels. The nice thing to note from the histograms is that, our algorithm preserves the general shapes of the histograms. This feature of our algorithm makes it difficult to detect whether any data is hidden or not in the transmitted image. 8 8 7 7-5 5 1 15 2 25 3 (a) Cover image -5 5 1 15 2 25 3 (b) Stego image Figure 7: Histogram of Red channel.

7 7-5 5 1 15 2 25 3-5 5 1 15 2 25 3 (a) Cover image (b) Stego image Figure 8: Histogram of Green channel. -5 5 1 15 2 25 3 (a) Cover image -5 5 1 15 2 25 3 (b) Stego image Figure 9: Histogram of Blue channel. 5. Conclusion and future works In this paper, we introduce a new idea in image based steganography, where variable no bits can be stored in each channel. Our algorithm uses actual color of the channel to decide no of data bits to store. This approach leads to very high capacity with low visual distortions. Experimental results demonstrate that our algorithm performs better than other similar algorithms. There are several ways to improve our variablebits algorithm: Select the partition at run time, based on the cover media, rather than using the static (fixed) partition scheme for all cover images. Use color information of all three channels to determine the partition. This will lead to using different partition schemes for different parts of the image. 6. Acknowledgement We would like to thank King Fahd University of Petroleum & Minerals (KFUPM) for supporting this work. 7. References [1] Provos, N., Honeyman, P, Hide and seek: An introduction to steganography, IEEE Security & Privacy Magazine 1 (23) pp. 32-44 [2] Karen Bailey, Kevin Curran, An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, Vol 3, Issue 1 (26) pp. 55-88 [3] Adnan Gutub, Mahmoud Ankeer, Muhammad Abu- Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, Pixel indicator high capacity technique for RGB image based Steganography, WoSPA 28 5 th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18 2 March 28.