DOI QR코드

DOI QR Code

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M. (Department of Information Technology, Pune Institute of Computer Technology) ;
  • Talbar, Sanjay N. (Department of Electronics and Telecommunication SGGS Institute of Engineering and Technology)
  • Received : 2013.03.12
  • Accepted : 2014.01.27
  • Published : 2014.06.30

Abstract

A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.

Keywords

References

  1. T. Kanai, H. Suzuki, and F. Kimura, "Metamorphosis of arbitrary triangular meshes," IEEE Computer Graphics and Applications, vol. 20, no. 2, pp. 62-75, 2000.
  2. H. Nakamura and Z. Qiangfu, "Information hiding based on image morphing," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, Okinawa, Japan, 2008, pp. 1585-1590.
  3. S. Kondo and Q. Zhao, "A novel steganographic technique based on image morphing," in Ubiquitous Intelligence and Computing: Proceedings of the Third International Conference, Wuhan, China, September 3-6, 2006 (Lecture Notes in Computer Science Vol. 4159), J. Ma, H. Jin, L. Yang, and J. P. Tsai, Eds. Heidelberg, Germany: Springer Berlin, 2006, pp. 806-815.
  4. A. M. Bagade and S. N. Talbar, "Image morphing concept for secure transmission of image data contents over internet," Journal of Computer Science, vol. 6, no. 9, pp. 987-992, 2010. https://doi.org/10.3844/jcssp.2010.987.992
  5. W. Ying and P. Moulin, "Perfectly secure steganography: capacity, error exponents, and code constructions," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2706-2722, 2008. https://doi.org/10.1109/TIT.2008.921684
  6. S. Narayana and G. Prasad, "Two new approaches for secured image steganography using cryptographic techniques and type conversions," Signal & Image Processing, vol. 1, no. 2, pp. 60-73, 2010.
  7. P. A. Regalia, "Cryptographic secrecy of steganographic matrix embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 786-791, 2008. https://doi.org/10.1109/TIFS.2008.2002940
  8. M. Mohamed, F. Al-Afari, and M. Bamatraf, "Data hiding by LSB substitution using genetic optimal key-permutation," International Arab Journal of e-Technology, vol. 2, no. 1, pp. 11-17, 2011.
  9. X. Liao, Q. Y. Wen, and J. Zhang, "A steganographic method for digital images with four-pixel differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8, 2011. https://doi.org/10.1016/j.jvcir.2010.08.007
  10. C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
  11. R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  12. C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003. https://doi.org/10.1016/S0031-3203(02)00289-3
  13. Z. Xinpeng, "Efficient data hiding with plus-minus one or two," IEEE Signal Processing Letters, vol. 17, no. 7, pp. 635-638, 2010. https://doi.org/10.1109/LSP.2010.2049415
  14. K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tua, "A novel image steganographic method using tri-way pixel-value differencing," Journal of Multimedia, vol. 3, no. 2, pp. 37-44, 2008.
  15. G. Swain and S. Lenka, "LSB array based image steganography technique by exploring the four least significant bits," in Global Trends in Information Systems and Software Applications (Communications in Computer and Information Science Vol. 270), P. V. Krishna, M. R. Babu, and E. Ariwa, Eds. Heidelberg, Germany: Springer Berlin, 2012, pp. 479-488.
  16. C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, 2008. https://doi.org/10.1016/j.patcog.2008.01.019
  17. E. Walia, P. Jain, and Navdeep, "An analysis of LSB & DCT based steganography," Global Journal of Computer Science and Technology, vol. 10, no. 1, pp. 4-8, 2010.
  18. L. Yu, Y. Zhao, R. Ni, and T. Li, "Improved adaptive LSB steganography based on chaos and genetic algorithm," EURASIP Journal on Advances in Signal Processing, vol. 2010, no. 1, pp. 876946, 2010. https://doi.org/10.1155/2010/876946
  19. H. B. Kekre, A. Athawale, and P. N. Halarnkar, "Increased capacity of information hiding in LSB's method for text and image," World Academy of Science, Engineering and Technology, vol. 2, no. 5, pp. 657-660, 2008.
  20. A. Yadollahpour and H. M. Naimi, "Attack on LSB steganography in color and grayscale images. using autocorrelation coefficients," European Journal of Scientific Research, vol. 31, no. 2, pp. 172-183, 2009.
  21. C. H. Hsieh and Q. Zhao, "Image enhancement and image hiding based on linear image fusion," in Image Fusion [Online], O. Ukimura, Ed. Intech, 2011, Chapter 2. Available: http://dx.doi.org/10.5772/14331
  22. M. Kharrazi, H. Sencar, and N. Memon, "Improving steganalysis by fusion techniques: a case study with image steganography," in Transactions on Data Hiding and Multimedia Security I (Lecture Notes in Computer Science Vol. 4300), Y. Shi, Ed. Heidelberg, Germany: Springer Berlin, 2006, pp. 123-137.
  23. N. N. EL-Emam, "Hiding a large amount of data with high security using steganography algorithm," Journal of Computer Science, vol. 3, no. 4, pp. 223-232, 2007. https://doi.org/10.3844/jcssp.2007.223.232
  24. A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1768), A. Pfitzmann, Ed. Heidelberg, Germany: Springer Berlin, 2000, pp. 61-76.
  25. C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
  26. A. Nissar and A. H. Mir, "Classification of steganalysis techniques: a study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010. https://doi.org/10.1016/j.dsp.2010.02.003
  27. R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative analysis of image steganography," International Journal of Computer Applications, vol. 2, no. 3, pp. 41-47, 2010. https://doi.org/10.5120/644-900
  28. H. S. Manjunatha Reddy and K. B. Raja, "High capacity and security steganography using Discrete Wavelet Transform," International Journal of Computer Science and Security, vol. 3, no. 6, pp. 462-472, 2010.
  29. L. Siwei and H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, 2006. https://doi.org/10.1109/TIFS.2005.863485
  30. H. Sajedi and M. Jamzad, "Secure steganography based on embedding capacity," International Journal of Information Security, vol. 8, no. 6, pp. 433-445, 2009. https://doi.org/10.1007/s10207-009-0089-y
  31. R. Shreelekshmi, M. Wilscy, and C. E. V. Madhavan, "Cover image preprocessing for more reliable LSB replacement steganography," in Proceedings of the International Conference on Signal Acquisition and Processing, Bangalore, India, 2010, pp. 153-156.
  32. R. Z. Wang and Y. S. Chen, "High-payload image steganography using two-way block matching," IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, 2006. https://doi.org/10.1109/LSP.2005.862603
  33. M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, "A high capacity 3D steganography algorithm," IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp. 274-84, 2009. https://doi.org/10.1109/TVCG.2008.94
  34. I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221-229, 2003. https://doi.org/10.1109/TIP.2002.807363
  35. M. Kharrazi, H. T. Sencar, and N. D. Memon, "Performance study of common image steganography and steganalysis techniques," Journal of Electronic Imaging, vol. 15, no. 4, pp. 041104, 2006. https://doi.org/10.1117/1.2400672
  36. The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/
  37. S. F. Mare, M. Vladutiu, and L. Prodan, "Decreasing change impact using smart LSB pixel mapping and data rearrangement," in Proceedings of the IEEE 11th International Conference on Computer and Information Technology, Pafos, Cyprus, 2011, pp. 269-276.

Cited by

  1. Audio Data Hiding Based on Sample Value Modification Using Modulus Function 2016, https://doi.org/10.3745/JIPS.03.0054
  2. Security of Image Information using Steganography and QR Code in IoT vol.15, pp.2, 2015, https://doi.org/10.7236/JIIBC.2015.15.2.31
  3. Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition vol.17, pp.3, 2015, https://doi.org/10.3390/e17031218
  4. Watermarking technique based on three-coefficient comparison in DCT domain vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1531-8
  5. Data embedding in audio signal using multiple bit marking layers method vol.76, pp.9, 2017, https://doi.org/10.1007/s11042-016-3851-y