Multi-bit robust image steganography based on modular arithmetic
- 77 Downloads
Abstract
The main objective is to design a robust algorithm which can hide multiple target bits without direct replacement of the bits of cover image and at the same time maintain perceptibility of carrier medium by reducing the distortion rate by intensity adjustment. The method uses the strength of modular arithmetic for embedding target data and at the same time able to solve the overlapping problem. In this double layer security technique first the target bits are converted into another number system and then these converted digits are embedded by adjusting the pixel intensities in such a way so that modulo operation retrieve data correctly at the receiver side. The proposed technique is tested on different class of images and analyzed based on different parameters. The histograms are distorted significantly for more than four bit insertion and the average PSNR is 34.7 for four multi-bit insertion with 100% payload. Different standard LSB detectors like SP, WS etc. are fail to detect hidden bits and at the same time the statistical attack on stego media unable to get success on stego images. The performance of the proposed technique is measured by Stirmark Benchmark 4.0 whereas the security strength is calculated through KL divergence which establishes it as a more secure algorithm. The Average Embedding Capacity of this technique is four. The work shows better performances than many state-of-the-art-works. The method reduces the distortion rate to half of the standard multi-bit LSB technique. This helps to retain imperceptibility with the increase of capacity through multi-bit insertion. The robustness is introduced in this spatial domain technique by embedding target data without direct replacement of cover bits. This algorithm uses the NP-complete nature of modulo operation to increase security and at the same time introduces parallelism to reduce time complexity.
Keywords
Image steganography Radix conversion Modulo operator Multi-bit steganography Embedding capacity RobustnessNotes
References
- 1.Andreas W, Pfitzmann A (1999) Attacks on steganographic systems In: Proc. of 3rd International workshop on information hiding, September 1999, pp 61–76Google Scholar
- 2.Aryal A, Motegi K, Imaizumi S, Aoki N (2015) Improvement of multi-bit information embedding algorithm for palette-based images. In: Lopez J, Mitchell C (eds) Information Security. ISC 2015. Lecture Notes in Computer Science, vol 9290. Springer, ChamGoogle Scholar
- 3.Asai H (1976) A recursive radix conversion formula and its application to multiplication and division. Elsevier Journal of Computers & Mathematics with Applications 2(3–4):255–265CrossRefGoogle Scholar
- 4.Bailey K, Curran K (2006) An evaluation of image based steganography methods. Journal of Multimedia Tools and Applications 30(1):55–88CrossRefGoogle Scholar
- 5.Bergman M (2016) It’s Hard to Get Good (Security) Help These Days. IEEE Consumer Electronics Magazine 5(3):132–133CrossRefGoogle Scholar
- 6.Boute RT (1992) The Euclidean definition of the functions div and mod. ACM Trans Program Lang Syst (TOPLAS) (ACM Press (New York, NY, USA)) 14(2):127–144CrossRefGoogle Scholar
- 7.Brent RP, Zimmermann P (2010) Modern Computer Arithmetic, Cambridge Monographs on Computational and Applied Mathematics (No. 18). Cambridge University Press, Cambridge, pp 236Google Scholar
- 8.Cachin C (2004) An information theoretic model for steganography. Inf Comput 192:41–56MathSciNetCrossRefGoogle Scholar
- 9.Cha S–H, Srihari SN (2002) On measuring the distance between histograms. Pattern Recognition, the Journal of Pattern Recognition Society 35:1355–1370CrossRefGoogle Scholar
- 10.Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727–752CrossRefGoogle Scholar
- 11.Chugh G, Yadav R, Saini R (2014) A New Image Steganographic Approach Based on Mod Factor for RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition 7(3):27–44CrossRefGoogle Scholar
- 12.Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB Steganography via Sample Pair Analysis. In: the Proc. of 5th Information Hiding Workshop, Vol 2578, pp 355–372Google Scholar
- 13.Dumitrescu D, Stan IM, Simion E (2017) Steganography techniques, IACR Cryptology ePrint Archive (2017). Available at: https://eprint.iacr.org/2017/341.pdf. Accessed 16th April 2018
- 14.Feng B, Lu W, Sun W (2015) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Transactions on Information Forensics and Security 10(2):243–255CrossRefGoogle Scholar
- 15.Fridrich J, Kodovsk J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444CrossRefGoogle Scholar
- 16.Gonzalez RC, Woods RE (2002) Digital Image Processing (2nd ed). Prentice Hall, IndiaGoogle Scholar
- 17.Hussain M, Wahab AWA, Javed N, Jung KH (2016) Recursive information hiding scheme through LSB, PVD shift, and MPE. IETE Tech Rev J 35(1):1–11Google Scholar
- 18.Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur, Springer 8:1–14Google Scholar
- 19.Ker AD (2007) Optimally weighted least-squares steganalysis. In: Delp Edward J., Wong P. W., (eds) Proc. of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX 6505, pp 16. https://doi.org/10.1117/12.704606
- 20.Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. In: Proc. SPIE, Vol 6819, pp 5–17Google Scholar
- 21.Kuo W-C, Kuo S-H, Wu L-C (2015) Multi-Bit Data Hiding Scheme for Compressing Secret Messages. Applied Sciences Journal 5(4):1033–1049CrossRefGoogle Scholar
- 22.Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging ‘99 Security and Watermarking of Multimedia Contents 3657:219–239Google Scholar
- 23.Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2017) A Novel Data Hiding Algorithm for High Dynamic Range Images. IEEE Transactions on Multimedia 19(1):196–211CrossRefGoogle Scholar
- 24.Luo W, Huang F, Huang J (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214CrossRefGoogle Scholar
- 25.Modular Arithmetic-Cryptographer's Mathematics. Available at: http://www2.sunysuffolkedu/fultonj/MA22/Modular%20Arithmetic%20&%20Cryptography.pdf
- 26.Mukherjee I, Paul G (2013) Efficient Multi-bit Image Steganography in Spatial Domain. Information Systems Security, Springer, LNCS, Chapter 29, vol 8303, pp 270–284Google Scholar
- 27.Nguyen BC, Yoon SM, Lee HK (2006) Multi Bit Plane Image Steganography. IWDW, LNCS 4283, pp 61–70Google Scholar
- 28.Paul G, Davidson I, Mukherjee I, Ravi SS (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 75(5):1–27Google Scholar
- 29.Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information Hiding - A Survey. In: Proc. of the IEEE, special issue protection of multimedia content, vol 87, no. 7, pp 1062–1078Google Scholar
- 30.Pevny T, Filler T, Bas P (2010) Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. Information Hiding, Springer, LNCS, Berlin, Chapter 20, vol 6387, pp 161–177Google Scholar
- 31.Prashanti G, Sandhyarani K (2015) A New Approach for Data Hiding with LSB Steganography. Advances in Intelligent Systems and Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 70, vol 338, pp 423–430Google Scholar
- 32.Pund-Dange S, Desai CG (2017) Data Hiding Technique using Catalan-Lucas Number Sequence. Indian Journal of Science and Technology 10(4):1–6CrossRefGoogle Scholar
- 33.Rajopadhye S. Number Systems and Radix Conversion. Available at: www.cs.colostate.edu/~cs270/.Spring12/Notes/NumberSystems
- 34.Sedighi V, Fridrich J, Cogranne R (2015) Content Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. In: Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol 9409, San Francisco, CAGoogle Scholar
- 35.Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715MathSciNetCrossRefGoogle Scholar
- 36.Shu X, Zhang J, Yao DD, Feng WC (2016) Fast Detection of Transformed Data Leaks. IEEE Transactions on Information Forensics and Security 11:528–542CrossRefGoogle Scholar
- 37.Singh S, Attri VK (2015) State-of-the-art Review on Steganographic Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition 8(7):161–170CrossRefGoogle Scholar
- 38.Stanley CA Pairs of Values and the Chi-squaredAttack. Available at: orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf
- 39.Test Images, DECSAI image Database, Available at: http://decsai.ugr.es/cvg/dbimagenes/
- 40.The information hiding homepage, “Photo Database”, Available at: http://www.petitcolas.net/watermarking/image_database
- 41.The Quotient Remainder Theorem. Available at: https://www.khanacademy.org/computing/computerscience/cryptography/modarithmetic/a/the-quotient-remainder-theorem
- 42.USC-SIPI Image Database, Vol. 3: Miscellaneous. Available at http://sipi.usc.edu/database/
- 43.Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications 34(2):142–151CrossRefGoogle Scholar
- 44.Vatai E Discrete mathematics I-Number theory Congruence. Available at: http://compalg.inf.elte.hu/~vatai/dm1enorg/l07-congruences.pdf
- 45.Wang S–J (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Math Comput 164:99–116MathSciNetzbMATHGoogle Scholar
- 46.Wang C–M, Wu N-I, Tsai C-S, Hwang M-S (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158CrossRefGoogle Scholar
- 47.Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251–1263CrossRefGoogle Scholar
- 48.Xie L, Zhu L, Chen G (2016) Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval. Multimedia Tools and Applications 75(15):9185–9204CrossRefGoogle Scholar
- 49.Yang C-Y, Wang W–F (2015) Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. Genetic and Evolutionary Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 43, Vol. 329, pp 145–154Google Scholar
- 50.Zhu L, Jin H, Zheng R, Feng X (2014) Effective naive Bayes nearest neighbor based image classification on GPU. J Supercomput 68(2):820–848CrossRefGoogle Scholar
- 51.Zhu L, Shen J, Xie L (2015) Topic Hypergraph Hashing for Mobile Image Retrieval. In: Proc. of the 23rd ACM International Conference on Multimedia, Australia, pp 843–846Google Scholar