Reversible Image Steganography Using Dual-Layer LSB Matching
- 6 Downloads
Recently, reversible information hiding (RIH) methods have drawn substantial attention in many privacy-sensitive real-time applications, such as the Internet of Things (IoT) enabled communications, electronic health care infrastructure, and military applications. The RIH methods are proven to be competent in such hyper-sensitive infrastructures where the loss of a single bit of information is not acceptable. In this paper, dual-layered based RIH method using modified least significant bit (LSB) matching has been proposed. The objective of the proposed work is to enhance the embedding efficiency (EE) using dual-layer based embedding strategy and to curtail the distortion caused to the stego-image to improve its quality. At the first layer of embedding, each pixel conceals two bits of information using the proposed modified LSB matching method to produce the intermediate pixel pair (IPP). Further, the IPP is utilized to conceal four bits of information during the next layer of embedding. Experimental study reveals that, the proposed method can embed 1,572,864 bits of secret data with peak signal-to-noise ratio (PSNR) of 47.86 dB, 48.05 dB, 46.51 dB and 48.14 dB, for the respective images. Further, the image quality assessment parameters like structural similarity (SSIM) index and universal image quality index (Q) are as good as the existing literature. Additionally, the proposed method shows excellent anti-steganalysis ability to regular and singular (RS) and pixel difference histogram (PDH) analysis.
KeywordsSteganography Reversible information hiding Steganalysis Embedding efficiency
- 4.Pradhan, A., Sahu, A. K., Swain, G., & Sekhar, K. R. (2016). Performance evaluation parameters of image steganography techniques. In IEEE international conference on research advances in integrated navigation systems (pp. 1–8).Google Scholar
- 5.Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66.Google Scholar
- 9.Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence, 2(1), 56–64.Google Scholar
- 11.Abu-Marie, W., Gutub, A., & Abu-Mansour, H. (2010). Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal & Image Processing, 1(3), 196–204.Google Scholar
- 12.Sahu, A. K., & Swain, G. (2019). A novel multi stego-image based data hiding method for gray scale image. Pertanika Journal of Science & Technology, 27(2), 753–768.Google Scholar
- 16.Shi, Y. Q., Ni, Z., Zou, D., Liang, C., & Xuan, G. (2004, May). Lossless data hiding: Fundamentals, algorithms and applications. In 2004 IEEE international symposium on circuits and systems (IEEE Cat. No. 04CH37512) (Vol. 2, pp. II-33). IEEE.Google Scholar
- 17.Barton, J. M. (1997). Method and apparatus for embedding authentication information within digital data, U.S. Patent 5646997.Google Scholar
- 25.Ou, B., Li, X., Zhao, Y., & Ni, R. (2014). Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Processing: Image Communication, 29(7), 760–772.Google Scholar
- 35.USC-SIPI Image Database. Retrieved 11 February, 2019 http://sipi.usc.edu/database/database.php?volume=misc.
- 36.Gutub, A., Al-Qahtani, A., & Tabakh, A. (2009). Triple-A: Secure RGB image steganography based on randomization. In IEEE/ACS International Conference on Computer Systems and Applications, 2009. AICCSA 2009 (pp 400–403). IEEE.Google Scholar