DOI QR코드

DOI QR Code

A New Approach for Information Security using an Improved Steganography Technique

  • Received : 2013.03.29
  • Accepted : 2013.07.08
  • Published : 2013.09.30

Abstract

This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB's (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

Keywords

References

  1. A. Ker (June, 2005), "Steganalysis of LSB Matching in Gray scale Images", IEEE Signal Processing Letter, vol. 12, no.6, pp. 441-444. https://doi.org/10.1109/LSP.2005.847889
  2. A. Ker, (May 23-25, 2004), "Improved Detection of LSB Steganography in Grayscale Images". In Proc. 6th International Workshop. Toronto (Canada), Springer LNCS, vol. 3200, p. 97-115.
  3. Adnan Gutub, Ayed Al-Qahtani, AbdulazizTabakh (May 10-13, 2009), "Triple-A: Secure RGB Image Steganography Based on Randomization" Proceedings of IEEE/ACS International Conference on Computer Systems and Applications (AICCSA, 2009), Rabat, Morocco. pp.400-403.
  4. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, AbdulrahmanShaheen, and AleemAlvi (18-20 March, 2008), "Pixel Indicator high capacity Technique for RGB image Based Steganography", Proceedings of 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA 2008), University of Sharjah, Sharjah, U.A.E.
  5. Ali Shariq Imran, M. YounusJaved, and NaveedSarfrazKhattak (2007) "A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information", World Academy of Science, Engineering and Technology 31 2007.
  6. Arjun, N Santosh.; AtulNegi, (14-17 Nov. 2006), "A Filtering Based Approach to Adaptive Steganography," TENCON 2006, IEEE Region 10 Conference, vol., no., pp.1-4.
  7. AroojNissar, A. H. Mir, (Decemeber, 2010), "Classification of Steganalysis Techniques: A Study", Digital Signal Processing, Elsevier, Vol.20, No.6, pp.1758-1770. https://doi.org/10.1016/j.dsp.2010.02.003
  8. Bin Li, JunhuiHe,JiwuHuang,Yun Qing Shi (April, 2011), "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing Volume 2, Number 2.
  9. C. C. Thien, J. C. Lin, (2003), "A Simple and High-Hiding Capacity Method for Hiding Digit-By-Digit Data in Images Based On Modulus Function". Pattern Recognition, vol. 36, p. 2875-2881. https://doi.org/10.1016/S0031-3203(03)00221-8
  10. C. H. Yang, C. Y. Weng, (December, 2006), "A Steganographic Method for Digital Images by Multi-Pixel Differencing." In Proc. International Computer Symposium. Taipei (Taiwan), pp. 831 to 836.
  11. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun (2008), "Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems". IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497. https://doi.org/10.1109/TIFS.2008.926097
  12. Chi-Kwong Chan, L. M. Cheng, (2001), "Improved Hiding Data in Images by Optimal Moderately-Significant-Bit Replacement", IEE Eelectronics letters, vol. 37, no. 16, p. 1017-1018. https://doi.org/10.1049/el:20010714
  13. Chi-Kwong Chan, L. M. Cheng, (2004), "Hiding data in images by simple LSB substitution. Pattern Recognition", Vol. 37, p. 469-474. https://doi.org/10.1016/j.patcog.2003.08.007
  14. Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan (2006), "Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels." Pattern Recognition, vol. 39, no. 6, p. 1155-1167. https://doi.org/10.1016/j.patcog.2005.12.011
  15. Chin-Chen Chang, Ju-Yuan Hsiao, Chi-Shiang Chan (2003), "Finding Optimal Least-Significant-Bit Substitution in Image Hiding By Dynamic Programming Strategy". Pattern Recognition, Vol. 36, p.1538-1595.
  16. Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu (2002), "A Fast And Secure Image Hiding Scheme Based on LSB Substitution", International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, p. 399-416. https://doi.org/10.1142/S0218001402001770
  17. Chin-Chen Chang, Tseng, H.W. (2004), "A Steganographic Method for Digital Images Using Side Match.", Pattern Recognition Letters, Vol. 25, pp.1431-1437. https://doi.org/10.1016/j.patrec.2004.05.006
  18. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang (2008), "A high quality steganographic method with pixel-value differencing and modulus function." Journal of Systems and Software, Vol. 81, No. 1, pp. 150-158. https://doi.org/10.1016/j.jss.2007.01.049
  19. D.C. Wu, W. H. Tsai (2003), "A Steganographic Method for Images by Pixel-Value Differencing", Pattern Recognition Letter, Vol. 24, No. 9-10, p. 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6
  20. GandharbaSvvalin,Saroj Kumar Lenka (June, 2012), "A Novel Approach to RGB Channel Based Image Steganography Technique", International Arab Journal of e-Technology, Vol. 2, No. 4.
  21. H. B. Kekre, ArchanaAthawale, Pallavi N. Halarnkar (2008), "Increased Capacity of Information Hiding In Lsb's Method For Text And Image" International Journal of Electrical, Computer, and Systems Engineering, Vol. 2, No. 4, p. 246-249.
  22. H. B. Kekre, ArchanaAthawale, Pallavi N. Halarnkar, (2009) "Performance Evaluation Of Pixel Value Differencing And Kekre's Modified Algorithm For Information Hiding In Images", ACM International Conference on Advances in Computing, Communication and Control (ICAC3).
  23. H.C. Wu, N.I. Wu, C.-S Tsai, M.S Hwang, (2005), "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615.
  24. J. C. Joo, T. W. Oh, H. Y. Lee, H. K. Lee (Jan, 2011), "Adaptive Steganographic Method Using the Floor Function with Practical Message Formats," International. Journal of Innovative Computing, Information and Control, Vol. 7, No. 1, pp. 161-175. ISSN 1349-4198.
  25. J. F. Canny, (1986), "A Computational Approach to Edge Detection". IEEE Trans. Pattern Anal. Machine Intell., Vol. PAMI-8, No. 6, pp. 679-697. https://doi.org/10.1109/TPAMI.1986.4767851
  26. J. K. Mandal and Debashis Das (July, 2012), "Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain" International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4.
  27. J.K.Mandal, A. Khamrui, (2011), "A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD)", Electronic System Design (ISED), International Symposium, pp: 347-351.
  28. Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE Signal Processing Letters, Vol. 13, no. 5, p. 285-287. https://doi.org/10.1109/LSP.2006.870357
  29. Jen-Chang Liu, Ming-Hong Shih (2008), "Generalizations of Pixel Value Differencing Steganography For Data Hiding In Images", FundamentaInformaticae, Vol. 83, No. 3, pp. 319-335.
  30. Jessica Fridrich, MiroslavGoljan, and Rui Du. (2001), "Reliable Detection of LSB Steganography in Color and Grayscale Images". In Proceedings of 2001 ACM workshop on Multimedia and Security: New Challenges, pp 27-30. ACM Press, 2001.
  31. Juan Jose Roque and JesusMariaMinguet (2009), "SLSB: Improving the Steganographic Algorithm LSB", 7th International Workshop on Security in Information Systems, 57-66, (2009).
  32. Kathryn Hempstalk, (11-19 February 2006), "Hiding Behind Corners: Using Edges in Images for Better Steganography", Proceedings of the Computing Women's Congress, Hamilton, New Zealand.
  33. Ki-Hyun Jung, Kyeoung-Ju Ha, Kee-Young Yoo (Aug 28-30, 2008), "Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods.", In Proc. 2008 International Conference on Convergence and Hybrid Information Technology (ICHIT '08). Daejeon (Korea), pp. 355-358.
  34. M. Hussain, M. Hussain, (5-6 September, 2011), "Embedding data in edge boundaries with high PSNR", Proceedings of 7th International Conference on Emerging Technologies (ICET 2011), vol., no., pp.1-6.
  35. M. Hussain, (2010), "Pixel Intensity Based High Capacity Data Embedding Method" International Conference on Information and Emerging Technologies (ICIET), pp.1-5.
  36. Manglem Singh, Birendra Singh, ShyamSundar Singh (April, 2007), "Hiding Encrypted Message in the Features of Images", IJCSNS, VOL. 7, No.4.
  37. Markus Kahn, (1995), Steganography Mailing List, 5 July.
  38. Mohammad TanvirParvez and Adnan Gutub (9-12 December 2008), "RGB Intensity Based Variable-Bits Image Steganography", Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference (APSCC 2008), Yilan, Taiwan.
  39. Najme Maleki, MehrdadJalali, M. VafaeiJahan, (July, 2011), "An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function," International Conference on. Information Processing, Computer Vision, and Pattern Recognition (IPCV'11), Las Vegas, Nevada, USA.
  40. Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw, (2012), "A Novel Digital Image Steganalysis Approach for Investigation. International Journal of Computer Applications", 6/1/2012, Vol. 47, pp18 .
  41. Niel F. Johnson, ZoranDuric, SushilJajodia (2000), "Information Hiding, and Watermarking - Attacks & Countermeasures," Kluwer Academic Publishers.
  42. Niels Ferguson and Bruce Schneier, (2003), Practical Cryptography, John Wiley.
  43. Niels Provos and Peter Honeyman (2002), "Detecting Steganographic Content on The Internet". In Proceedings of NDSS'02: Network and Distributed System Security Symposium, pp1-13, Internet Society, 2002.
  44. P. Mohan Kumar, K. L. Shunmuganathan (2012), "Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate", Information Security Journal: A Global Perspective, Vol. 21, Issue 2.
  45. P.V.C. Hough (1962), Method and Means for Recognizing Complex Patterns, U.S. Patent 3069654.
  46. R. Amirtharajan, J. Qin and J.B.B. Rayappan (2012). "Random Image Steganography and Steganalysis: Present Status and Future Directions", Information Technology Journal, Vol 11, pp 566-576. https://doi.org/10.3923/itj.2012.566.576
  47. R. H. Alwan., F. J. Kadhim, and A. T. Al-Taani, (2005), Data Embedding Based on Better Use of Bits in Image Pixels. International Journal of Signal Processing, 2 (1), 104-107.
  48. Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin (2000), "Hiding Data in Images by Optimal Moderately Significant Bit Replacement" IET Electronics Letters, vol. 36, no. 25, pp. 2069-2070. https://doi.org/10.1049/el:20001429
  49. Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, (2001), "Image Hiding by Optimal LSB Substitution And Genetic Algorithm." Pattern Recognition, vol. 34, p. 671-683. https://doi.org/10.1016/S0031-3203(00)00015-7
  50. Shao-Hui Liu, Tian-Hang Chen, Hong-Xun Yao, Wen Gao (Aug. 26-29, 2004), "A Variable Depth LSB Data Hiding Technique in Images". In Proc. 2004 International Conference on Machine Learning and Cybernetics. Shanghai (China), Vol. 7, p. 3990-3994.
  51. Specification for the Advanced Encryption Standard (AES), (Nov. 2001), Federal Information Processing Standards Publication 197.
  52. Stanley, C.A. (2005), "Pairs of Values and the Chi-squared Attack", in CiteSteer. 2005, pp. 1-45.
  53. W. Chen, C. Chang, T. Le, (2010), "High Payload Steganography Mechanism Using Hybrid Edge Detector", Expert Systems with applications, vol. 37, pp 3292-3301. https://doi.org/10.1016/j.eswa.2009.09.050
  54. W. Luo, F. Huang and J. Huang (2010), "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp.201-214. https://doi.org/10.1109/TIFS.2010.2041812
  55. Wen-Nung Lie, Li-Chun Chang (October 24-28, 1999), "Data hiding in images with adaptive numbers of least significant bits based on the human visual system." In Proc. IEEE Int. Conf., Image Processing. Kobe (Japan), pp 286-290.
  56. Westfeld and A. Pitzmann (1999), "Attacks on Steganographic Systems - Breaking the Steganographic Utilities Ezstego, Jsteg, Steganos, and S-tools-and Some Lessons Learned", In Proceedings of the 3rd Information Hiding Workshop, volume 1768 of LNCS, pages 61-76. Springer, 1999.
  57. X. Liao, Q.-Y. Wen, and J. Zhang (2011), "A Steganographic Method for Digital Images with Four-Pixel Differencing and Modified LSB substitution," Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8. https://doi.org/10.1016/j.jvcir.2010.08.007
  58. X. Zhang, S. Wang, (2004): Vulnerability of Pixel Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, vol.25, pp. 331-339. https://doi.org/10.1016/j.patrec.2003.10.014
  59. Xiaolong Li, Bin Yang, Daofang Cheng, TieyongZeng (2009), "A Generalization of LSB Matching". IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72. https://doi.org/10.1109/LSP.2008.2008947
  60. Y. K. Lee, L. H. Chen, (2000), "High Capacity Image Steganographic Model", IEEE Proc., Vis. Image Signal Process, Vol. 147, no. 3, p. 288-294.
  61. Y. R. Park, H. H. Kang, S. U. Shin, K. R. Kwon, (2005), "A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels.", In Proc. International Conference on Natural Computation. Berlin (Germany), Springer-Verlag LNCS, Vol. 3612, pp. 962-968.
  62. Youssef Bassil (December, 2012), "Image Steganography Based on a Parameterized Canny Edge Detection Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 60, No.4.
  63. Yung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li (2008), "A Large Payload Data Embedding Technique for Color Images", FundamentaInformaticae, Volume 88, Number 1-2, pp47-61.

Cited by

  1. DRM cloud framework to support heterogeneous digital rights management systems vol.75, pp.22, 2016, https://doi.org/10.1007/s11042-015-2662-x
  2. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key vol.7, pp.3, 2015, https://doi.org/10.3390/sym7031567
  3. Detection of damaged files and measurement of similarity to originals using entropy graph characteristics 2017, https://doi.org/10.1007/s11227-017-2121-8
  4. Constructing RBAC Based Security Model in u-Healthcare Service Platform vol.2015, 2015, https://doi.org/10.1155/2015/937914
  5. Game-Theory-Based Approach for Energy Routing in a Smart Grid Network vol.2016, 2016, https://doi.org/10.1155/2016/4761720
  6. Data hiding based on overlapped pixels using hamming code vol.75, pp.23, 2016, https://doi.org/10.1007/s11042-014-2355-x
  7. Detection and Modeling of Cyber Attacks with Petri Nets vol.16, pp.12, 2014, https://doi.org/10.3390/e16126602
  8. Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition vol.17, pp.3, 2015, https://doi.org/10.3390/e17031218
  9. Image hiding technique using a pseudo hexagonal structure approach pp.1925-7074, 2018, https://doi.org/10.1080/1206212X.2018.1438037