VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Similar documents
A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Analysis of Secure Text Embedding using Steganography

A New Image Steganography Depending On Reference & LSB

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

An Implementation of LSB Steganography Using DWT Technique

Colored Digital Image Watermarking using the Wavelet Technique

An Enhanced Least Significant Bit Steganography Technique

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Image Steganography using Sudoku Puzzle for Secured Data Transmission

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Steganography using LSB bit Substitution for data hiding

A Proposed Technique For Hiding Data Into Video Files

Sterilization of Stego-images through Histogram Normalization

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

A Novel Approach for Hiding Huge Data in Image

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Hiding Image in Image by Five Modulus Method for Image Steganography

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

An Improvement for Hiding Data in Audio Using Echo Modulation

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

HSI Color Space Conversion Steganography using Elliptic Curve

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Concealing Data for Secure Transmission and Storage

Block Wise Data Hiding with Auxilliary Matrix

Bitmap Steganography:

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

A New Steganographic Method for Palette-Based Images

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

LSB Encoding. Technical Paper by Mark David Gan

Keywords Secret data, Host data, DWT, LSB substitution.

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Dynamic Collage Steganography on Images

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

Digital Image Sharing using Encryption Processes

Uncompressed Image Steganography using BPCS: Survey and Analysis

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

RGB Intensity Based Variable-Bits Image Steganography

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Performance Improving LSB Audio Steganography Technique

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Evaluation of Visual Cryptography Halftoning Algorithms

Resampling and the Detection of LSB Matching in Colour Bitmaps

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

A Comprehensive Review on Secure Image Steganography

A Reversible Data Hiding Scheme Based on Prediction Difference

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

An Efficient Image Steganographic Algorithm Using CMYK Color Model

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Contrast Enhancement Based Reversible Image Data Hiding

An Integrated Image Steganography System. with Improved Image Quality

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Investigation of Various Image Steganography Techniques in Spatial Domain

Meta-data based secret image sharing application for different sized biomedical

A Study on Steganography to Hide Secret Message inside an Image

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Digital Watermarking Using Homogeneity in Image

Improved Detection of LSB Steganography in Grayscale Images

International Journal of Advance Research in Computer Science and Management Studies

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding

Medical Image Encryption and Compression Using Masking Algorithm Technique

REVERSIBLE data hiding, or lossless data hiding, hides

A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING

Application of Histogram Examination for Image Steganography

Different Steganography Methods and Performance Analysis

A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

Effective and Secure Method of Color Image Steganography

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACING METHOD

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

FPGA implementation of LSB Steganography method

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

A New Representation of Image Through Numbering Pixel Combinations

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Watermarking patient data in encrypted medical images

EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Journal of mathematics and computer science 11 (2014),

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Tampering Detection Algorithms: A Comparative Study

CSE 3482 Introduction to Computer Security.

Transcription:

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information in the least significant bits of color images. The number of bits used for hiding changes according to pixel neighborhood information where less resemblance between a pixel and its neighbors leads to using more bits for hiding. Experimental results are presented to show that the algorithm generally hides information with a good capacity while avoiding detection. Keywords: Image steganography, Information hiding, LSB method Introduction Steganography is a method of hiding a message inside other information so that the existence of the hidden message is concealed. Cryptography, in contrast, is a method of scrambling hidden information so that unauthorized persons will not be able to recover it. The main advantage steganography has over cryptography is that it hides the actual existence of secret information, making it an unlikely target of spying attacks. To achieve higher security, a combination of steganography with cryptography may be used. Surveys of different steganography techniques were presented in previous work, where secret information may be hidden in text, audio, image or video (Al-Othmani, et al., 2012), (Amirtharajan, et al., 2012), (Chhajed, et al., 2011), (Hmood, et al., 2010), (Jayaram, et al., 2011), (Reddy, et al., 2011). When an image is used for hiding information, it is called a stego image. Hiding in the least significant bits (LSBs) of each pixel is desired since their modification will cause less distortion compared to other bits. The number of bits used should be variable and related to the stego image to minimize distortion (Janakiraman, et al., 2012), (Pradhan, et al., 2012). However, some applications, such as lossy compression, involve 62

image alteration where some LSBs are lost. In such cases, more significant bits are used by transformation algorithms that utilize the special features of these applications. These techniques append coding information to the image with minimal or no change to the original pixels (Al-Husainy, 2011), (Zanganeh & Ibrahim, 2011). In this paper, a new algorithm is presented to hide information in LSBs of image pixels. The algorithm uses a variable number of bits for each pixel, where the number of bits is chosen based on the amount of degradation they may cause to the pixel compared to its neighbors. Analysis showed effectiveness of the algorithm in minimizing degradation while maintaining substantial hiding capacity. The Hiding Algorithm This algorithm uses a variable number of LSBs from each pixel for hiding, where the number of bits chosen from each pixel color (red, green, and blue) is different. Images in other color formats may be converted to Red-Green-Blue (RGB) matrices and converted back after the hiding process is done. The actual number of bits changes according to neighborhood information of each pixel color. When the resemblance between a pixel color and its neighbors is high, the pixel is located in a smooth area where change will be detected easily. Therefore, the number of bits used for hiding is chosen to be inversely proportional to the neighbors average value of each pixel color. The pixels used in hiding are those located in every line and every other column, as in the white squares of a chess board. Pixels on the borders are not used for hiding. This means that approximately 50% of the pixels are used for hiding, while the rest of the pixels are used in determining hiding values and capacity. Each RGB color is treated separately. The hiding process starts with the Red matrix, followed by the Green, and then the Blue. The color value of each one of these pixels is compared to the average of the same-color values of its four neighbors: left, right, above, and below. This comparison measures the resemblance between the pixel and it neighbors so that the number of hiding bits can be determined. The algorithm for hiding in each color matrix is shown in Fig. 1, where stegoc is stegor, stegog, or stegob, corresponding to the Red, Green, and Blue matrices of the original stego image, respectively. Each of these matrices has the same (n m) dimensions as the original image. This algorithm takes each color matrix individually, and it goes through every line of the matrix starting with the second line and stopping at the line before the last. It goes through the entries in every other column, taking odd and even numbered columns in odd and even numbered lines, respectively. Left and right border columns are not used for hiding. Each examined entry is compared to the average (ave) of its four neighbors. If the 63

magnitude of the difference between the entry and ave is less than a given threshold (α), the minimum number of LSBs is used for hiding. In the implementation of this paper, α was set to 7. Otherwise, the floor of the logarithm (base 2) of this difference will be the number of LSBs (numlsbs) used, which is at least one bit larger than the minimum. The minimum value is changed by subtracting a small integer (ε) to make the minimum take the values 1, 2, or 3 bits. An entry is used for hiding only if ave is at least twice as large as the largest possible value to be hidden in that entry. The actual hidden value is a number composed of numlsbs bits from the hidden message. If ave is larger than the original entry value in the stego image matrix, the new value of the entry will become (ave 2 numlsbs + b); otherwise, it will become (ave 2 numlsbs b). row = 2 while row n-2 and message is not finished col = 2 + (row MOD 2) while col m-2 ave = (stegoc(row-1,col)+stegoc(row+1,col)+stegoc(row,col-1)+stegoc(row,col+1))/4 dif = ave - stegoc(row,col) if dif α numlsbs = 3 - ε else numlsbs = log 2 ( dif ) - ε endif if ave 2 numlsbs+1 b = number composed of next group of numlsbs bits from hidden message if dif > 0 stegoc(row,col) = ave - 2 numlsbs + b else stegoc(row,col) = ave - 2 numlsbs - b endif endif col = col + 2 endwhile row = row+1 endwhile Fig. 1. Algorithm for hiding in one color matrix The extraction process searches each of the three color matrices (Red, Green, and Blue), going through all lines and every other column as in the hiding procedure. The number of bits used for hiding in an entry, stegoc(row, col) is also determined by examining ave; the average of the four neighbors as in the hiding process. If ave is larger than 2 numlsbs+1, there is 64

a value hidden in the entry, which is stegoc(row, col) ave + 2 numlsbs. All extracted hidden values are concatenated to form the original message. Implementation and Analysis The algorithm was applied to 50 different color images of different types, where the sizes of these images ranged from 10 to 3,578 kilobytes. A random secret message of sufficient length was used for hiding. The analysis of the results focus on two aspects: hiding capacity and difficulty to detect the message existence in the stego image. The capacity is computed as the ratio of the maximum hidden message size to the stego image size. The results were compared using different values for the minimum number of bits allowed for hiding. Recall that only non-adjacent pixels are used for hiding. These are approximately 50% of the pixels in the image. Fig. 2 demonstrates the results for one sample image. It shows the original image and the stego images after hiding with a minimum of 1, 2, and 3 bits per pixel color. As seen in the figure, the difference between the original image and the stego images is not easily visible. When examining these four images closely, the stego image that used a minimum of 3 bits for hiding appears slightly darker than the other three do. The comparison becomes clearer when the following measurements are examined. The hiding capacity for this sample increased from (a) Original sample image (b) Image after hiding with a 1-bit (c) Image after hiding with a 2-bit (d) Image after hiding with a 3-bit Fig. 2. Original sample image and stego images after hiding 65

6.42% to 12.45% and 17.87% when the minimum number of hiding bits was increased from 1 to 2 and 3, respectively. However, the peak signal-to-noise ratio (PSNR) decreased from 35.80 to 33.95 and 30.59 decibels (db) and the correlation decreased from 0.9977 to 0.9968 and 0.9938 for these respective values for the minimum numbers of hiding bits. The average results for all 50 test images are shown in Table 1. The average correlation value was taken for the absolute values of correlation for all images, where each of the original images was compared to its stego image to obtain the individual correlation values. The overall high values of PSNR and correlation indicate big resemblance between the original images and their stego images, and consequently, less hidden-message detection ability. Table 1. Average results for 50 test images Min Hide Bits Capacity PSNR (db) Correlation 1 6.54% 35.23 0.9938 2 12.27% 32.97 0.9921 3 17.02% 29.70 0.9877 As seen in Table 1, the average hiding capacity for all 50 images increased when the minimum number of hiding bits was increased where the PSNR and correlation values decreased. The capacity increase when using a minimum of 2 hiding bits rather than 1 was 5.73 percentage points, which is an increase of 87.6% in the average capacity value. The cost of this increase was lowering the PSNR and correlation values by 6.4% and 0.17%, respectively. When the minimum number of hiding bits was increased from 2 to 3, the capacity increased by 38.7% where PSNR and correlation values decreased by 9.9% and 0.44%, respectively. This is a lower increase in capacity with a larger decrease in PSNR and correlation values compared to the changes that resulted when going from 1 to 2 hiding bits. This indicates that using a minimum of 2 bits for hiding provided a relatively better tradeoff between hiding capacity and stego image quality than using a minimum of 1 or 3 bits. Conclusion The new algorithm presented in this paper uses a variable number of LSBs from each color of each considered pixel for hiding information, where approximately 50% of all pixels are considered for hiding. The actual number of hiding bits is inversely proportional to the pixel s resemblance to its neighbors. Test results showed that the algorithm has a good capacity for hiding information while keeping the hidden information difficult to detect. 66

References: A. Al-Othmani, A. Abdul Manaf and A. Zeki, A survey on steganography techniques in real time audio signals and evaluation, International Journal of Computer Science Issues, vol. 9, no. 1, p. 3037, 2012. R. Amirtharajan, J. Qin and J. Rayappan, Random image steganography and steganalysis: Present status and future direction, Information Technology Journal, vol. 11, no. 5, pp. 566-576, 2012. G. Chhajed, K. Deshmukh and T. Kulkarni, Review on binary image steganography and watermarking, International Journal on Computer Science & Engineering, vol. 3, no. 11, pp. 3645-3651, 2011. A. Hmood, H. Jalab, Z. Kasirun, B. Zaidan and A. Zaidan, On the capacity and security of steganography approaches: An overview, Journal of Applied Sciences, vol. 10, no. 16, pp. 1825-1833, 2010. P. Jayaram, H. Ranganatha and H. Anupama, Information hiding using audio steganography - A survey, International Journal of Multimedia & Its Applications, vol. 3, no. 3, pp. 86-96, 2011. V. Reddy, A. Subramanyam and P. Reddy, Implementation of LSB steganography and its evaluation for various file formats, International Journal of Advanced Networking & Applications, vol. 2, no. 5, pp. 868-872, 2011. S. Janakiraman, R. Amirtharajan, K. Thenmozhi and J. Rayappan, Pixel forefinger for gray in color: A layer by layer stego, Information Technology Journal, vol. 11, no. 1, pp. 9-19, 2012. A. Pradhan, D. Sharma and G. Swain, Variable rate steganography in digital images using two, three and four neighbor pixels, Indian Journal of Computer Science & Engineering, pp. 457-463, 2012. M. Al-Husainy, A new image steganography based on decimal-digits representation, Computer & Information Science, vol. 4, no. 6, pp. 38-47, 2011. O. Zanganeh and S. Ibrahim, Adaptive image steganography based on optimal embedding and robust against Chi-square attack, Information Technology Journal, vol. 10, no. 7, pp. 1285-1294, 2011. 67