DOI QR코드

DOI QR Code

A Data Hiding Scheme for Grayscale Images Using a Square Function

  • Kwon, Hyejin (School of Electronics Engineering, Kyungpook National Univ.) ;
  • Kim, Haemun (Department of Materials and Energy Engineering, Kyungwoon Univ.) ;
  • Kim, Soonja (School of Electronics Engineering, Kyungpook National Univ.)
  • Received : 2014.02.13
  • Accepted : 2014.04.05
  • Published : 2014.04.30

Abstract

Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.

Keywords

1. INTRODUCTION

Currently, the internet is the most-used channel among the various data communication channels. However, communication through the internet is vulnerable to many forms of attack, including eavesdropping and impersonation. These vulnerabilities cause security and privacy problems. To ensure security and privacy in communication via the internet, a cryptosystem is usually employed [1-3]. A cryptosystem modifies the secret message into a series of meaningless bits so that an observer (or eavesdropper) cannot understand the message. However, cryptosystems have a problem that results from the fact that encrypted messages are random bit strings: an observer can notice that the two entities communicate in secret [1,4].

However, data hiding conceals the secret communication itself. Data hiding is a part of steganography with watermarking. Steganography is a set of methods that embed information into cover media. Usually, the cover medium is an image; in this case, we call the embedded result a stegoimage. One branch of image steganography(in short, steganography), watermarking, embeds a symbol to protect copyright or ownership. The hidden symbol in the embedded result does not have to be invisible, but it should tolerate many image manipulations and still contains the symbol. In another branch of steganography, image hiding, a secret message is embedded, and an observer should not detect the existence of a secret message in the stego-image, even if a large amount of secret information is hidden [1,4,5-8,14]. In fact, the size of the secret message and the imperceptibility of the secret data in the stego-image are two criteria of the embedded result; however, improving one requires sacrificing the other. Enhancing both criteria simultaneously is an open problem.

One method to easily obtain a stego-image is a simple LSB substitution scheme. In this scheme, the secret message is substituted for LSBs in each pixel. The number of substituted LSBs of each pixel depends on the length of the secret message and the size of the cover image. This scheme is based on the fact that changing the least significant bits (LSBs) has only a small effect on the whole image. However, an observer can easily detect the existence of secret data using steganalysis, such as RS detection attack [4,5,9]. In spite of flaws of simple LSB substitution scheme, it has inspired many researchers to study an image hiding scheme in the spatial domain.

In 2006, the EMD scheme [10] was proposed that greatly reduces the perceptibility of secret data in the embedded result by adding or subtracting 1 to the pixel value of the cover image. This image hiding scheme starts by translating secret data into a base 2n+1 representation, where n is an embedding parameter. One digit of the secret data in the base 2n+1 numeral system is embedded in n pixels. This scheme increases the quality of the embedded result by adding or subtracting 1 to the pixel value, but the total size of the secret message is limited.

To increase the allowed size of the secret message, Chao et al. proposed diamond encoding as an image hiding scheme [11]. However, we demonstrate that their scheme has poor efficiency and that the stego-image from their scheme has many gray stains, which allows an observer to detect the existence of secret data if the cover image has many pixels whose values are close to either 0 or 255, as shown in Section Ⅱ. We propose a new image hiding scheme in Section Ⅲ that provides a high quality embedded result efficiently using a square function. In Section Ⅳ, we present the experimental results and security analysis against RS detection attack[9]. Finally, we conclude in Section Ⅴ.

 

2. REVIEW OF THE DIAMOND ENCODING IMAGE HIDING METHOD

In this section, we review the steganographic method with diamond encoding (in short, diamond scheme)[11]. In addition, we analyze the diamond scheme.

2.1 Description of the diamond scheme

In the diamond scheme, a grayscale cover image is divided into non overlapping blocks of two successive pixels. A block carries one digit in the base-(2k2+2k+1) numeral system, where k is an embedding parameter. For simplicity, we let 2k2+2k+1 be represented by l. For each k, there exists a diamond function fk : Z256×Z256→Zl where fk(p,q)=(2k+1)p+qmodl and a diamond matching function Dk : Zl→Z2k+1×Z2k+1. The diamond matching function Dk is specified by a diamond shaped table, such as those in Fig. 1 and Fig. 2. Assuming that the coordinate of 0∈Zl is (0,0)∈Z2k+1×Z2k+1, Dk(a) is the coordinate of a in the diamond shaped table Dk for all a∈Zl. For instance, D2(4) is (1,-1).

Fig. 1.The diamond matching function Dk and its coordinates, where k is 1 and is 2.

Fig. 2.The diamond matching function Dk, where k is 3 and is 6.

The secret embedding procedure starts by selecting the embedding parameter k. The embedding parameter k is determined according to the length of the secret message s and the size of the cover image R×C : k is the smallest integer that satisfies Then, the binary secret message s is translated into base l representation (s)l, s↦(s)l(=s1║s2║⋯║st║⋯║sm), where st is the t-th digit of (s)l, m is an integer that is less than half the image size R×C and ║ represents concatenation. The value of the function fk, fk(bt)=fk(pt,qt)=(2k+1)pt+qt modl, is computed for every block bt, where bt=(pt,qt) is the t-th block in the cover image and both pt,qt are pixels. Then, the difference dt=st-fk(bt) is calculated for all t. Finally, the pair of stego-pixel values (pt′,qt′)=(pt,qt)+(a,b) are computed, where (a,b)=Dk(dt). Here, some stego-pixels may not fall between 0 and 255. We call these pixels the falling-off-boundary pixels. These pixels require re-adjustment so that they are included in [0,255]: if the stego-pixel x′>255(resp. x′<0), then x′=x′-l(resp. x′=x′+l). The secret embedding procedure ends if all the falling-off-boundary pixels are re-adjusted.

In the secret data extracting procedure, the stego-image is divided into non-overlapping blocks, as in the cover image. Then, the series of outputs of the diamond function for each block is the secret data (s)l in the base-l numeral system. In other words, fk(b1′)║fk(b2′)║⋯║fk(bt′)║⋯║fk(b′m) is the secret message that is converted into base l representation, where bt′ is the t-th block of stego-image and Thus, the binary secret message can be obtained by translating the series of fk(bt′) into base-2 representation.

Example. We give an example of producing a stego-block according to the diamond scheme. Assuming that the embedding parameter k is 3, then we determine that l is 25. We let the t-th digit st of the secret message in the base-25 numeral system be 6∈Z25, and the t-th block bt=(pt,qt) of the cover image be (200,190). The diamond function value of bt is f3(bt)=f3(200,190)=7×200+190 mod. 25= 15.Then, dt=st-f3(bt) modl=6-15 mod 25 =16. The output of the diamond matching function D3(dt) is (-1,-2), as shown in Fig. 2.(a). Thus, the t-th block of the stego-image is bt+D3(bt)=(199,188). The secret digit st concealed in t-th stegoblock is extracted by the diamond function as follows: st=fk(bt′)=f(199,188)=7×199+188mod25=6.

2.2 Analysis of the diamond scheme

This section shows the two drawbacks of the diamond scheme : a non-smooth embedded result and inefficiency.

2.2.1 Nonsmooth stego-image

The diamond scheme solves the falling-offboundary problem by simply adding or subtracting l to the falling-off-boundary pixel value. This re-adjustment procedure is simple to apply, but the difference between the original cover pixel and stego-pixel is remarkable when l is large. This large difference makes the embedded result look non-smooth.

For example, let k=3(l=25), st=9, bt=(253,264). Then, stego-block bt′ is (254,256). This block requires re-adjustment because the second pixel of this block overflows the boundary value 255. The re-adjusted block is (254,256)-(0,25)=(254,231). As a result, the difference between the original block and the stego-block is (1,23), which is a significant difference that causes the embedded result to have a perceptible spot.

Fig. 3. shows a non-smooth stego-image when the secret data s is a series of random bits with |s|=777350, which is less than 3×R×C, where R×C is the image size. Compared with the cover image, the embedded result has many perceptible spots in Tiffany’s hair and teeth so that the image is not smooth. Even if the peak of the signal-to-noise ratio (PSNR) that is employed to estimate the quality of the stego-image is pretty high (35.21 dB), we can still detect the existence of a secret message[1,11,12]. In short, the embedded result looks nonsmooth when the cover image has many pixels whose values are in the neighborhood of a boundary value(0 or 255) and l is large.

Fig. 3.Non-smoothness of a stego-image generated by the diamond scheme.

In the diamond scheme, binary secret data is converted to its representation in base-l. Because l is not a power of 2, the base conversion is not easy when the secret data is large. In fact, the time required to convert |s|-bit secret data into base-l representation is O(|s|2)[13]. Moreover, the naïve conversion procedure has difficulty translating the base, even if the secret data has about 200,000 bits.

2.2.2 Inefficiency

In the diamond scheme, binary secret data is converted to its representation in base-l. Because l is not a power of 2, the base conversion is not easy when the secret data is large. In fact, the time required to convert |s|-bit secret data into base-l representation is O(|s|2)[13]. Moreover, the naïve conversion procedure has difficulty translating the base, even if the secret data has about 200,000 bits.

 

3. PROPOSED SCHEME WITH SQUARE FUNCTION

In this section, we propose an image hiding scheme that employs a square function to address two problems of the diamond scheme. In order to solve the non-smoothness of the stego-image, we employ a refined re-adjustment step for fallingoff-boundary pixels rather than the rough re-adjustment procedure, such as adding or subtracting a relatively large number l. Moreover, to solve the inefficiency, we set the base l to a power of 2.

Notations. The followings are notations used in this paper.

Fig. 4.The square function S2 and its coordinates, the square function S3, and construction of blocks and the direction of the embedding progress

3.1 Data embedding procedure

In proposed scheme, a grayscale cover image is divided into non-overlapping blocks, and one block consists of two consecutive pixels, as in the diamond scheme. Furthermore, one digit of the secret data that is translated into base-22k representation can be hidden in each block. In this section, we describe proposed data embedding procedure in detail.

3.1.1 Setup phase

- Cover image division : the cover image with R×C pixels is divided into non-overlapping blocks of two pixels, as shown in Fig. 4(d). Simply we represent the cover image as series of blocks b1║b2║⋯║bt║⋯.

- Determining the embedding parameter k : the embedding parameter k depends on the image size R×C and the length of the secret message |s| . In detail, k is the smallest integer that satisfies

- Base translation : the secret message s should be converted into (s)l. In other words, the base of s must be translated into l.

3.1.2 Encoding phase

The embedding phase is described below. It is similar to the diamond scheme, except for the re-adjustment step.

Because the block function value of the stegoblock includes information about the secret message, block function value should not be changed after the block is re-adjusted. One solution is to set , where is a falling-off-boundary pixel, as in the diamond scheme. However, there is large gap between the cover image and stego-image with this rough re-adjustment step; thus, it allows the secret message to be perceived. The proposed sophisticated re-adjustment step employs a value less than , rather than employing ; as a result, we reduce the difference between the cover image and the stego-image. Moreover, there is no difference in the block function value before and after the re-adjustment step.

3.1.3 Data extraction procedure

Extraction of the secret message from the stego-image is simpler than embedding.

Note. The following illustrates why Bk(bt′)=st.

Bk(bt′)=2kpt′+qt′ mod l=2k(pt+a)+(qt+b) mod l

=2kpt+qt+2ka+b mod l=Bk(bt)+Sk-1(a,b)

=Bk(bt)+dt=st.

Example. We give an example of producing a stego-block with proposed scheme. Assuming that the embedding parameter k and l are 2 and 16, respectively. We let the t-th digitnof secret data st be 12∈Z16, and the t-th block bt=(253,254). Then the block function value B2(253,254) is 22×253+254 mod 16=2. And dt=st-B2(bt) mod l=10, S2(dt)=S2(10)=(2,2) as shown in Fig. 4.(a) and (b). Thus the t-th pre-stego-block bt′ is bt+S2(dt)=9255,256). This block requires to be re-adjusted because the second pixel of the block overflows the boundary value 255. By e.viii of embedding phase, the final stego-block bt′ is (252,252). The extraction procedure is st=B2(bt′)=22×252+252 mod 16=12.

 

4. EXPERIMENTAL RESULTS

In this section, we present our experimental results, including a quality comparison with other schemes and security analysis against RS detection attack. We experimented with the wellknown 8-bit grayscale images “Couple", “Zelda", “Lena", “Tiffany", “F16", “Baboon", and “Pepper" in Fig. 5, 6, and 7; the size of first two images is 256×256, and the others are 512×512. Moreover, we performed the experiment with MATLAB, and the secret message was generated by the pseudo-random function in MATLAB.

Fig. 5.The cover images and stego-images with 256×256 images generated by the diamond scheme and the proposed scheme where |s|=196608 bits.

Fig. 6.The cover images and stego-images with 512×512 images generated by the diamond scheme and the proposed scheme where |s|=786432 bits.

Fig. 7.The cover images and stego-images with 512×512 images generated by the diamond scheme and the proposed scheme where |s|=786432bits.

4.1 Quality and capacity

We employ peaks of the signal-to-noise ratio (PSNR) to estimate the quality of the stegoimages. The capacities and relative PSNRs for various test images are shown in Table 1 and Table. 2. Table 1 and Table 2, respectively, represent the PSNRs when the capacity is 2×R×C bits and 3×R×C bits with an image size of R×C.

Table 1.Comparison of PSNR with simple LSB substitution scheme, the diamond scheme, and ours when |s|=2×R×C, where R×C is the image size

Table 2.Comparison of PSNR with simple LSB substitution scheme, the diamond scheme, and ours when|s|=3×R×C with an image size of R×C

The tables show that our scheme provides consistent PSNRs over various images. On the other hand, we find that the PSNRs of stego-images generated by the diamond scheme are inconsistent and depend on the cover images. In detail, the diamond scheme and the proposed method yield similar outputs, except “Couple”, “Zelda”, and “Tiffany”: the suit of a man in Fig. 5.(b) and the hair and the cloth in Zelda in Fig. 5.(e) have many gray stains. Moreover, the teeth and hair of Tiffany in Fig. 6.(e) have many gray spots. These three cover images have multiple pixels whose values are close to either 0 or 255. As cited in Section Ⅱ.2.A, the diamond scheme provides a poor embedding result when the size of the embedded message is large and the cover image have many neighborhoods of pure white or pure black (pixel values of 255 and 0, respectively). In the meantime, our scheme yields reasonable embedding results irrespective of the images.

4.2 Security : RS detection attack

This section shows that our scheme is secure against RS detection attack[9]. The RS detection attack was proposed by Fridrich et al. and detects stego-images. In their paper, a discrimination function f is defined that estimates the smoothness of a pixel group, an invertible operation flipping F, and a row vector of length n mask M. To determine whether or not an image is a stego-image, the image is divided into disjoint groups of n adjacent pixels. Furthermore, f(G) is compared with f(FM(G)), where G is a pixel group and FM(G) is flipped G with mask M. If f(G) is larger(or smaller) than f(FM(G)), the pixel group G is defined as a regular group R (or singular group S). Otherwise, it is defined as an unusable group U. The value of RM (or SM and UM) is the number of regular(or singular and unusable) groups with mask M. Finally, the image is judged to be a stego-image if it does not satisfy the following properties:

RM≅R-M and SM≅S-M.

We subjected the stego-images generated by our scheme to an RS detection attack with f(G)=f(x1,x2,⋯,xn)=|xi+1-xi| as a discrimination function and [0 1 1 0] as the mask M. Fig. 8. is one attack result when the cover image is “Lena”, and we obtained similar results for the other images.

Fig. 8.Security of proposal scheme against RS attack.

 

5. CONCLUSION

To secure communication, research on an image hiding scheme that hides the communication itself in the images has been proposed in addition to cryptography. In image hiding, the capacity and imperceptibility of secret data in the stego-image are two important barometers of the quality of the scheme. Many researchers have proposed LSBbased image hiding schemes to conceal a large quantity of secret data while maintaining the imperceptibility of the secret data in the stego-image. Among the image hiding schemes, we reviewed the diamond scheme proposed by Chao et al. and revealed two drawbacks of the diamond scheme: poor embedding results for images that have many pixels whose values are close to 0 or 255 when there is a large quantity of secret data and inefficiency caused by base conversion. We proposed a new image hiding scheme that employs a square function. In addition, the proposed scheme employs a sophisticated re-adjustment procedure for falling-off-boundary pixels and efficient base conversion. In detail, one digit in the base 22k numeral system is embedded in two pixels. Moreover, we showed that the proposed scheme provides higher quality results than the diamond scheme according to the experimental results.

References

  1. Y. H. Yu, C. C. Chang, and I. C. Lin, "A New Steganographic Method for Color and Grayscale Image Hiding," Computer Vision and Image Understanding, Vol. 107, No. 3, pp. 183-194, 2007. https://doi.org/10.1016/j.cviu.2006.11.002
  2. C. C. Change and H. W. Tseng, "A Steganographic Method for Digital Images using Side Match," Pattern Recognition Letters, Vol. 25, No. 12, pp. 1431-1437, 2004. https://doi.org/10.1016/j.patrec.2004.05.006
  3. C. C. Lin and N. L. Hsueh, "A Lossless Data Hiding Scheme based on Three-pixel Block Differences," Pattern Recognition, Vol. 41, No. 4, pp. 1415-1425, 2008. https://doi.org/10.1016/j.patcog.2007.09.005
  4. R. Z. Wang, C. F. Lin, and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  5. T. Morkel, J. H. P. Eloff, and M. S. Olivier, "An Overview of Image Steganography," Information and Computer Security Architecture (ISSA), pp. 1-11, 2005.
  6. C. L. Liu and S. R. Liao, "High-performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No. 9, pp. 2945-2955, 2008. https://doi.org/10.1016/j.patcog.2008.03.005
  7. C. C. Chang, C. Y. Lin, and Y. Z. Wang, "New Image Steganographic Methods using Runlength Approach," Information Sciences, Vol. 176, No. 22, pp. 3393-3408, 2006. https://doi.org/10.1016/j.ins.2006.02.008
  8. D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, No. 9, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  9. J. Fridrich, M. Goljan, and R. Du, "Reliable Detection of LSB Steganography in Color and Grayscale Images," Proceeding of the 2001 Workshop on Multimedia and Security: New Challenges, pp. 27-30, 2001.
  10. X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, 781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  11. R. M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, "A Novel Image Data Hiding Scheme with Diamond Encoding," European Association for Signal Processing(EURASIP) Journal on Information Security, Vol. 2009, No. 1, pp. 1-9, 2009.
  12. C. C. Lin, W. L. Tai, and C. C. Chang, "Multilevel Reversible Data Hiding based on Histogram Modification of Difference Images," Pattern Recognition, Vol. 41, No. 12, 3582-3591, 2008. https://doi.org/10.1016/j.patcog.2008.05.015
  13. N. Koblitz, A Course in Number Theory and Cryptography, Springer, New York, 1994.
  14. D. Kim, K. Yoo, " A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting," Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 639-650, 2012. https://doi.org/10.9717/kmms.2012.15.5.639

Cited by

  1. Data Hiding Using Pixel-Value Modular Operation vol.18, pp.4, 2015, https://doi.org/10.9717/kmms.2015.18.4.483
  2. 함정 전투체계 군사영상 특성에 기반한 하이브리드 정보은닉 기법 vol.19, pp.9, 2014, https://doi.org/10.9717/kmms.2016.19.9.1669