DOI QR코드

DOI QR Code

An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis

  • Nag, Amitava (Department of Information Technology, Academy of Technology) ;
  • Choudhary, Soni (Department of Computer Science and Engineering, Academy of Technology) ;
  • Basu, Suryadip (Department of Computer Science and Engineering, Academy of Technology) ;
  • Dawn, Subham (Department of Computer Science and Engineering, Academy of Technology)
  • Received : 2016.07.14
  • Accepted : 2016.08.02
  • Published : 2016.08.30

Abstract

Steganography is the art and science of secure communication. It focuses on both security and camouflage. Steganographic techniques must produce the resultant stego-image with less distortion and high resistance to steganalysis attack. This paper is mainly concerned with two steganographic techniques-least significant bit (LSB)++ and the reversible histogram transformation function (RHTF). LSB++ is likely to produce less distortion in the output image to avoid suspicion, but it is vulnerable to steganalysis attacks. RHTF using a mod function technique is capable of resisting the most popular and efficient steganalysis attacks, such as the regular-singular pair attack and chi-squared detection steganalysis, but it produces a lot of distortion in the output image. In this paper, we propose a new steganographic technique by combining both methods. The experimental results show that the proposed technique overcomes the respective drawbacks of each method.

Keywords

References

  1. C.-C. Chang, T. D. Kieu, "A reversible data hiding scheme using complementary embedding strategy," Inform. Sci., vol. 180, no. 16, pp. 3045-3058, 2010. https://doi.org/10.1016/j.ins.2010.03.027
  2. C.-C. Chang, W.-L.Tai, C.-C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. Circ. Syst. Video Technol., vol. 16, no. 10, pp. 1301-1308, 2006. https://doi.org/10.1109/TCSVT.2006.882380
  3. D.-C. Lou, J.-L.Liu, "Steganographic method for secure communications," Comput.Security, vol. 21, no. 5, pp. 449-460, 2012.
  4. D.-C. Lou, C.-H. Sung, "A steganographic scheme for secure communications based on the chaos and Euler theorem," IEEE Trans. Multimedia, vol. 6, no. 3, pp.501-509, 2004. https://doi.org/10.1109/TMM.2004.827493
  5. J. Mielikainen, "LSB Matching Revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  6. D.-C. Lou, C.-L.Lin, C.-L.Liu, "Novel steganalysis chemes for BPCS steganography," Imaging Sci. J., vol. 56, no. 4, pp. 232-242, 2008. https://doi.org/10.1179/174313108X283964
  7. R. Petrovic, J. M. Winograd, K. Jemili, E. Metois, "Data hiding within audio signals," in Proc. of the 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, pp. 88-95, 1999.
  8. A. A. Hanafy, G. I. Salama, Y. Z. Mohasseb, "A secure covert communication model based on video steganography," in Proc. of the 2008 IEEE Military Communications Conference, pp. 1-6, 2008.
  9. B.-S. Ko, R. Nishimura, Y. Suzuki, "Time-spread echo method for digital audio watermarking," IEEE Trans. Multimedia, vol. 7, no. 2, pp. 212-221, 2005. https://doi.org/10.1109/TMM.2005.843366
  10. B. Liu, F. Liu, C. Yang, Y. Sun, "Secure steganography in compressed video bitstreams," in Proc. of the 3rd International Conference on Availability, Reliability and Security, pp. 1382-1387, 2008.
  11. A.R.S Marcal, P.R. Pereira, "A steganographic method for digital images robust to RS staganalysis," in: International Conference on Image Analysis and Recognition, Toronto, Canada, Lecture Notes in Computer Science, vol. 3656, 2005, pp. 1192-1199.
  12. J. Frridrich, M. Goljan, R. Du, "Reliable detection of LSB steganography in color and grayscale images," in: Proceedings ACM Workshop Multimedia and Security, 2001, pp. 27-30.
  13. A. Nissar, A. H. Mir, "Classification of steganalysis techniques: A study"
  14. Wu, Dugelay, Cheung," A data mapping method for steganography and its application to images," in: 10th International Workshop on Information Hiding, vol. 5284, USA, May 2008, p. 236-250.
  15. KazemGhazanfari, GhaemmaghamiShahrokh, Saeed R. Khosravi, "LSB++: an improvement to LSB+ steganography," in: TENCON 2011-2011 IEEE Region 10 Conference, IEEE, 2011, pp. 364-368.
  16. W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on lsb matching revisited, IEEE Tans. Inf. Forens. Security.Vol. 5, no. 2, pp. 201-214, 2010. https://doi.org/10.1109/TIFS.2010.2041812
  17. J. Mielikainen, LSB Matching Revisited, IEEE Signal Process. Lett.Vol. 13, no. 5, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  18. D. C Lou, C. H Hu, "LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis" Inform. Sci., vol. 188, pp. 346-358, 2012. https://doi.org/10.1016/j.ins.2011.06.003
  19. Mohsen Bazyar, Rubita Sudirman, A New Method to Increase the Capacity of Audio Steganography Based on the LSB Algorithm, JurnalTeknologi, 74: 6 (2015) 49-53.
  20. Wang R, Lin C, Lin J. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 2001; 34(3): 671-83. https://doi.org/10.1016/S0031-3203(00)00015-7
  21. Chang C, Hsiao J, Chan C. Finding optimal leastsignificant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognit, 2003; 36(7): 1583-95. https://doi.org/10.1016/S0031-3203(02)00289-3
  22. Chan C, Cheng L. Hiding data in images by simple LSB substitution. Pattern Recognit 2004; 37(3): 469-74. https://doi.org/10.1016/j.patcog.2003.08.007
  23. El Safy R, Zayed H, El Dessouki A. An adaptive steganographic technique based on integer wavelet transform. In: International conference onnetworking and media convergence (ICNM 2009). IEEE; 2009. p. 111-7.
  24. Bhattacharyya S, Sanyal G. Data hiding in images in discrete wavelet domain using PMM. World Acad Sci Eng Tech 2010;68:597-605.
  25. Torres-Maya S, Nakano-Miyatake M, Perez-Meana H. n image steganography systems based on BPCS and IWT. In: 16th International conference onelectronics, communications and computers. IEEE; 2006. p. p. 51.
  26. Lin C, Shiu P. High capacity data hiding scheme for DCT-based images. J Inf Hiding Multimedia Signal Process 2010; 1(3): 220-40.
  27. M. Ghebleh, A. Kanso, A robust chaotic algorithm for digital image steganography,Communications in Nonlinear Science and Numerical Simulation, Volume 19, Issue 6, June 2014, Pages 1898-1907. https://doi.org/10.1016/j.cnsns.2013.10.014
  28. Al-Dmour, Hayat, and Ahmed Al-Ani. "Quality optimized medical image information hiding algorithm that employs edge detection and data coding."Computer Methods and Programs in Biomedicine 127 (2016): 24- 43. https://doi.org/10.1016/j.cmpb.2016.01.011
  29. Westfeld A, Pfitzmann A. Attacks on steganographic systems. In: Third international workshop on information hiding, IH '99. London, UK: Springer; 2000. p. 61-76.
  30. Provos N, Honeyman P. Detecting steganographic content on the internet. In: NDSS'02: network and distributed system security symposium. Internet Society; 2002.