Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0005

A High Quality Steganographic Method Using Morphing  

Bagade, Anant M. (Department of Information Technology, Pune Institute of Computer Technology)
Talbar, Sanjay N. (Department of Electronics and Telecommunication SGGS Institute of Engineering and Technology)
Publication Information
Journal of Information Processing Systems / v.10, no.2, 2014 , pp. 256-270 More about this Journal
Abstract
A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.
Keywords
Morphed Steganography; Hiding Capacity; Imperceptibility; Stego Image Quality;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. S. Manjunatha Reddy and K. B. Raja, "High capacity and security steganography using Discrete Wavelet Transform," International Journal of Computer Science and Security, vol. 3, no. 6, pp. 462-472, 2010.
2 L. Siwei and H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, 2006.   DOI   ScienceOn
3 H. Sajedi and M. Jamzad, "Secure steganography based on embedding capacity," International Journal of Information Security, vol. 8, no. 6, pp. 433-445, 2009.   DOI
4 R. Shreelekshmi, M. Wilscy, and C. E. V. Madhavan, "Cover image preprocessing for more reliable LSB replacement steganography," in Proceedings of the International Conference on Signal Acquisition and Processing, Bangalore, India, 2010, pp. 153-156.
5 R. Z. Wang and Y. S. Chen, "High-payload image steganography using two-way block matching," IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, 2006.   DOI   ScienceOn
6 M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, "A high capacity 3D steganography algorithm," IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp. 274-84, 2009.   DOI   ScienceOn
7 I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221-229, 2003.   DOI   ScienceOn
8 M. Kharrazi, H. T. Sencar, and N. D. Memon, "Performance study of common image steganography and steganalysis techniques," Journal of Electronic Imaging, vol. 15, no. 4, pp. 041104, 2006.   DOI   ScienceOn
9 The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/
10 S. F. Mare, M. Vladutiu, and L. Prodan, "Decreasing change impact using smart LSB pixel mapping and data rearrangement," in Proceedings of the IEEE 11th International Conference on Computer and Information Technology, Pafos, Cyprus, 2011, pp. 269-276.
11 E. Walia, P. Jain, and Navdeep, "An analysis of LSB & DCT based steganography," Global Journal of Computer Science and Technology, vol. 10, no. 1, pp. 4-8, 2010.
12 C. H. Hsieh and Q. Zhao, "Image enhancement and image hiding based on linear image fusion," in Image Fusion [Online], O. Ukimura, Ed. Intech, 2011, Chapter 2. Available: http://dx.doi.org/10.5772/14331   DOI
13 L. Yu, Y. Zhao, R. Ni, and T. Li, "Improved adaptive LSB steganography based on chaos and genetic algorithm," EURASIP Journal on Advances in Signal Processing, vol. 2010, no. 1, pp. 876946, 2010.   DOI   ScienceOn
14 H. B. Kekre, A. Athawale, and P. N. Halarnkar, "Increased capacity of information hiding in LSB's method for text and image," World Academy of Science, Engineering and Technology, vol. 2, no. 5, pp. 657-660, 2008.
15 A. Yadollahpour and H. M. Naimi, "Attack on LSB steganography in color and grayscale images. using autocorrelation coefficients," European Journal of Scientific Research, vol. 31, no. 2, pp. 172-183, 2009.
16 M. Kharrazi, H. Sencar, and N. Memon, "Improving steganalysis by fusion techniques: a case study with image steganography," in Transactions on Data Hiding and Multimedia Security I (Lecture Notes in Computer Science Vol. 4300), Y. Shi, Ed. Heidelberg, Germany: Springer Berlin, 2006, pp. 123-137.
17 N. N. EL-Emam, "Hiding a large amount of data with high security using steganography algorithm," Journal of Computer Science, vol. 3, no. 4, pp. 223-232, 2007.   DOI
18 C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008.   DOI   ScienceOn
19 A. Nissar and A. H. Mir, "Classification of steganalysis techniques: a study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010.   DOI   ScienceOn
20 R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative analysis of image steganography," International Journal of Computer Applications, vol. 2, no. 3, pp. 41-47, 2010.   DOI
21 W. Ying and P. Moulin, "Perfectly secure steganography: capacity, error exponents, and code constructions," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2706-2722, 2008.   DOI   ScienceOn
22 S. Narayana and G. Prasad, "Two new approaches for secured image steganography using cryptographic techniques and type conversions," Signal & Image Processing, vol. 1, no. 2, pp. 60-73, 2010.
23 P. A. Regalia, "Cryptographic secrecy of steganographic matrix embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 786-791, 2008.   DOI   ScienceOn
24 M. Mohamed, F. Al-Afari, and M. Bamatraf, "Data hiding by LSB substitution using genetic optimal key-permutation," International Arab Journal of e-Technology, vol. 2, no. 1, pp. 11-17, 2011.
25 X. Liao, Q. Y. Wen, and J. Zhang, "A steganographic method for digital images with four-pixel differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8, 2011.   DOI   ScienceOn
26 C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.   DOI   ScienceOn
27 R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.   DOI   ScienceOn
28 C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.   DOI   ScienceOn
29 K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tua, "A novel image steganographic method using tri-way pixel-value differencing," Journal of Multimedia, vol. 3, no. 2, pp. 37-44, 2008.
30 Z. Xinpeng, "Efficient data hiding with plus-minus one or two," IEEE Signal Processing Letters, vol. 17, no. 7, pp. 635-638, 2010.   DOI   ScienceOn
31 G. Swain and S. Lenka, "LSB array based image steganography technique by exploring the four least significant bits," in Global Trends in Information Systems and Software Applications (Communications in Computer and Information Science Vol. 270), P. V. Krishna, M. R. Babu, and E. Ariwa, Eds. Heidelberg, Germany: Springer Berlin, 2012, pp. 479-488.
32 C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, 2008.   DOI   ScienceOn
33 T. Kanai, H. Suzuki, and F. Kimura, "Metamorphosis of arbitrary triangular meshes," IEEE Computer Graphics and Applications, vol. 20, no. 2, pp. 62-75, 2000.
34 H. Nakamura and Z. Qiangfu, "Information hiding based on image morphing," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, Okinawa, Japan, 2008, pp. 1585-1590.
35 S. Kondo and Q. Zhao, "A novel steganographic technique based on image morphing," in Ubiquitous Intelligence and Computing: Proceedings of the Third International Conference, Wuhan, China, September 3-6, 2006 (Lecture Notes in Computer Science Vol. 4159), J. Ma, H. Jin, L. Yang, and J. P. Tsai, Eds. Heidelberg, Germany: Springer Berlin, 2006, pp. 806-815.
36 A. M. Bagade and S. N. Talbar, "Image morphing concept for secure transmission of image data contents over internet," Journal of Computer Science, vol. 6, no. 9, pp. 987-992, 2010.   DOI
37 A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1768), A. Pfitzmann, Ed. Heidelberg, Germany: Springer Berlin, 2000, pp. 61-76.