zbMATH — the first resource for mathematics

A hybrid algorithm for robust image steganography. (English) Zbl 1458.94039
Summary: In this work, a novel hybrid algorithm has been developed for achieving imperceptible and robust image steganography for secure data communication. The novelty of the work lies in the careful manipulation of higher frequency coefficient of Discrete Cosine Transform (DCT) to maintain the perceptual quality of the image followed by embedding secret bits in the controlled DCT coefficients using random locations identified by deterministic Coupled Chaotic Map (CCM). The randomness of the CCM map is confirmed by National Institute of Standards and Technology, DIEHARD, ENT and TestU01 test suites. The experimental results demonstrate that the proposed technique has excellent stego-image quality keeping zero Bit Error Rate at maximum embedding capacity (EC). The proposed method has capability to withstand against malicious users as well as outperforms existing steganography techniques in terms of EC, and Peak Signal to Noise Ratio. The security of the proposed technique is subsequently examined by the key length, key sensitivity parameter and histogram analysis.
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
Diehard; TestU01
Full Text: DOI
[1] Anees, A.; Siddiqui, AM; Ahmed, J.; Hussain, I., A technique for digital steganography using chaotic maps, Nonlinear Dynamics, 75, 4, 807-816 (2014)
[2] Bhowal, K.; Bhattacharyya, D.; Pal, AJ; Kim, TH, A GA based audio steganography with enhanced security, Telecommunication Systems, 52, 4, 2197-220 (2013)
[3] Chan, CK; Cheng, LM, Hiding data in images by simple LSB substitution, Pattern Recognition, 37, 3, 469-474 (2004) · Zbl 1072.68534
[4] Chang, KC; Chang, CP; Huang, PS; Tu, TM, A novel image steganographic method using tri-way pixel-value differencing, Journal of Multimedia, 3, 2, 37-44 (2008)
[5] Chao, RM; Wu, HC; Lee, CC; Chu, YP, A novel image data hiding scheme with diamond encoding, EURASIP Journal on Information Security, 2009, 1, 658047 (2009)
[6] Cheddad, A.; Condell, J.; Curran, K.; Mc Kevitt, P., Digital image steganography: Survey and analysis of current methods, Signal Processing, 90, 3, 727-752 (2010) · Zbl 1177.94138
[7] Chen, J., A PVD-based data hiding method with histogram preserving using pixel pair matching, Signal Processing: Image Communication, 29, 3, 375-384 (2014)
[8] Cintra, RJ; Bayer, FM; Tablada, CJ, Low-complexity 8-point DCT approximations based on integer functions, Signal Processing, 99, 201-214 (2014)
[9] El Rahman, SA, A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information, Computers & Electrical Engineering, 70, 380-399 (2018)
[10] Ghebleh, M.; Kanso, A.; Noura, H., An image encryption scheme based on irregularly decimated chaotic maps, Signal Processing: Image Communication., 29, 5, 618-627 (2014)
[11] Hussain, M.; Wahab, AWA; Ho, AT; Javed, N.; Jung, KH, A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement, Signal Processing: Image Communication, 50, 44-57 (2017)
[12] Jafari, R.; Ziou, D.; Rashidi, MM, Increasing image compression rate using steganography, Expert Systems with Applications, 40, 17, 6918-6927 (2013)
[13] Khan, A.; Sarfaraz, A., Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method, Soft Computing, 23, 17, 1-12 (2018)
[14] Khan, M.; Shah, T.; Batool, SI, Texture analysis of chaotic coupled map lattices based image encryption algorithm, 3D Research, 5, 3, 19 (2014)
[15] Kim, C.; Kim, J.; Kim, DJ, Effects of personal motivation and computing characteristics on ubiquitous mobile device usages, International Journal of Mobile Communications, 17, 2, 127-156 (2019)
[16] Koupaei, JA; Hosseini, SMM; Ghaini, FM, A new optimization algorithm based on chaotic maps and golden section search method, Engineering Applications of Artificial Intelligence, 50, 201-214 (2016)
[17] L’Ecuyer, P.; Simard, R., TestU01: AC library for empirical testing of random number generators, ACM Transactions on Mathematical Software (TOMS), 33, 4, 1-40 (2007) · Zbl 1365.65008
[18] Li, CH; Lu, ZM; Su, YX, Reversible data hiding for BTC-compressed images based on biplane flipping and histogram shifting of mean tables, Information Technology Journal, 10, 7, 1421-1426 (2011)
[19] Lin, CC; Shiu, PF, High capacity data hiding scheme for DCT-based images, Journal of Information Hiding and Multimedia Signal Processing, 1, 3, 220-240 (2010)
[20] Lin, YK, A data hiding scheme based upon DCT coefficient modification, Computer Standards & Interfaces, 36, 5, 855-862 (2014)
[21] Luo, H.; Yu, FX; Chen, H.; Huang, ZL; Li, H.; Wang, PH, Reversible data hiding based on block median preservation, Information Sciences, 181, 2, 308-328 (2011)
[22] Malik, A.; Sikka, G.; Verma, HK, An AMBTC compression based data hiding scheme using pixel value adjusting strategy, Multidimensional Systems and Signal Processing, 29, 4, 1801-1818 (2018) · Zbl 1457.94162
[23] Ma, Y.; Luo, X.; Li, X.; Bao, Z.; Zhang, Y., Selection of rich model steganalysis features based on decision rough set \(\alpha \)-positive region reduction, IEEE Transactions on Circuits and Systems for Video Technology, 29, 2, 336-350 (2018)
[24] Maniriho, P.; Ahmad, T., Information hiding scheme for digital images using difference expansion and modulus function, Journal of King Saud University-Computer and Information Sciences, 31, 3, 335-337 (2018)
[25] Mao, Q.; Li, F.; Chang, CC, Reversible data hiding with oriented and minimized distortions using cascading trellis coding, Information Sciences, 317, 170-180 (2015)
[26] Marsaglia, G. (1996). DIEHARD: A battery of tests of randomness. Retrieved February 11, 2020 from http://www.fsu.edu/pub/diehard.
[27] Mielikainen, J., LSB matching revisited, IEEE Signal Processing Letters, 13, 5, 285-287 (2006)
[28] Miri, A.; Faez, K., An image steganography method based on integer wavelet transforms, Multimedia Tools and Applications, 77, 11, 13133-13144 (2018)
[29] Mishra, M., Kumar, S., & Mishra, S., (2012). Security enhanced digital image steganography based on successive Arnold transformation. In Advances in computer science, engineering & applications (pp. 221-229).
[30] Pan, JS; Li, W.; Yang, CS; Yan, LJ, Image steganography based on subsampling and compressive sensing, Multimedia Tools and Applications, 74, 21, 9191-9205 (2015)
[31] Qiao, T., Luo, X., Wu, T., Xu, M., & Qian, Z. (2019). Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2019.2962672.
[32] Qin, C.; Chang, CC; Lin, CC, An adaptive reversible steganographic scheme based on the just noticeable distortion, Multimedia Tools and Applications, 74, 6, 1983-1995 (2015)
[33] Rajaraman, V., IEEE standard for floating point numbers, Resonance, 21, 1, 11-30 (2016)
[34] Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E., A statistical test suite for random and pseudorandom number generators for cryptographic applications, 131 (2001), Gaithersburg: National Institute of Standards and Technology, Gaithersburg
[35] Saidi, M.; Hermassi, H.; Rhouma, R.; Belghith, S., A new adaptive image steganography scheme based on DCT and chaotic map, Multimedia Tools and Applications, 76, 11, 13493-13510 (2017)
[36] Subhedar, MS; Mankar, VH, Image steganography using redundant discrete wavelet transform and QR factorization, Computers & Electrical Engineering, 54, 406-422 (2016)
[37] Sun, W.; Lu, ZM; Wen, YC; Yu, FX; Shen, RJ, High performance reversible data hiding for block truncation coding compressed images, Signal, Image and Video Processing, 7, 2, 297-306 (2013)
[38] Swain, G., Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function, Optik, 180, 807-823 (2019)
[39] Tang, M.; Hu, J.; Song, W.; Zeng, S., Reversible and adaptive image steganographic method, AEU-International Journal of Electronics and Communications, 69, 12, 1745-1754 (2015)
[40] Tseng, HW; Leng, HS, A steganographic method based on pixel-value differencing and the perfect square number, Journal of Applied Mathematics, 2013, 1-8 (2013) · Zbl 1271.94005
[41] Valandar, MY; Ayubi, P.; Barani, MJ, A new transform domain steganography based on modified logistic chaotic map for color images, Journal of Information Security and Applications, 34, 142-151 (2017)
[42] Valandar, MY; Barani, MJ; Ayubi, P.; Aghazadeh, M., An integer wavelet transforms image steganography method based on 3D sine chaotic map, Multimedia Tools and Applications, 78, 8, 1-19 (2018)
[43] Walker, J. (2008). Ent-a pseudorandom sequence test program. Retrieved February 14, 2020 from http://www.fourmilab.ch/random/.
[44] Wang, CC; Chang, YF; Chang, CC; Jan, JK; Lin, CC, A high capacity data hiding scheme for binary images based on block patterns, Journal of Systems and Software, 93, 152-162 (2014)
[45] Wang, K.; Lu, ZM; Hu, YJ, A high capacity lossless data hiding scheme for JPEG images, Journal of Systems and Software, 86, 7, 1965-1975 (2013)
[46] Wang, XT; Chang, CC; Nguyen, TS; Li, MC, Reversible data hiding for high quality images exploiting interpolation and direction order mechanism, Digital Signal Processing, 23, 2, 569-577 (2013)
[47] Wang, Z.; Bovik, AC, A universal image quality index, IEEE Signal Processing Letters, 9, 3, 81-84 (2002)
[48] Wang, Z.; Bovik, AC; Sheikh, HR; Simoncelli, EP, Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Image Processing, 13, 4, 600-612 (2004)
[49] Wu, NI; Wu, KC; Wang, CM, Exploring pixel-value differencing and base decomposition for low distortion data embedding, Applied Soft Computing, 12, 2, 942-960 (2012)
[50] Yao, Y.; Zhang, W.; Yu, N.; Zhao, X., Defining embedding distortion for motion vector-based video steganography, Multimedia Tools and Applications, 74, 24, 11163-11186 (2015)
[51] Zhang, Y., Luo, X., Guo, Y., Qin, C., & Liu, F. (2019). Multiple robustness enhancements for image adaptive steganography in lossy channels. IEEE Transactions on Circuits and Systems for Video Technology. doi:10.1109/TCSVT.2019.2923980.
[52] Zhang, Y.; Luo, X.; Yang, C.; Liu, F., Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection, Multimedia Tools and Applications, 76, 3, 3649-3668 (2017)
[53] Zhang, Y.; Luo, X.; Yang, C.; Ye, D.; Liu, F., A framework of adaptive steganography resisting JPEG compression and detection, Security and Communication Networks, 9, 15, 2957-2971 (2016)
[54] Zhang, Y.; Qin, C.; Zhang, W.; Liu, F.; Luo, X., On the fault-tolerant performance for a class of robust image steganography, Signal Processing, 146, 99-111 (2018)
[55] Zhang, X.; Wang, S., Efficient steganographic embedding by exploiting modification direction, IEEE Communications Letters, 10, 11, 781-783 (2006)
[56] Zhang, Y.; Zhu, X.; Qin, C.; Yang, C.; Luo, X., Dither modulation based adaptive steganography resisting JPEG compression and statistic detection, Multimedia Tools and Applications, 77, 14, 17913-17935 (2018)
[57] Zhao, Z.; Guan, Q.; Zhang, H.; Zhao, X., Improving the robustness of adaptive steganographic algorithms based on transport channel matching, IEEE Transactions on Information Forensics and Security, 14, 7, 1843-1856 (2018)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.