Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats
-
https://doi.org/10.14419/ijet.v7i4.21726 -
Abstract
Recently, Steganography is an outstanding research area which used for data protection from unauthorized access. Steganography is defined as the art and science of covert information in plain sight in various media sources such as text, images, audio, video, network channel etc. so, as to not stimulate any suspicion; while steganalysis is the science of attacking the steganographic system to reveal the secret message. This research clarifies the diverse showing the evaluation factors based on image steganographic algorithms. The effectiveness of a ste-ganographic is rated to three main parameters, payload capacity, image quality measure and security measure. This study is focused on im-age steganographic which is most popular in in steganographic branches. Generally, the Least significant bit is major efficient approach utilized to embed the secret message. In addition, this paper has more detail knowledge based on Least significant bit LSB within various Images formats. All metrics are illustrated in this study with arithmetical equations while some important trends are discussed also at the end of the paper.
-
References
[1] HASHIM, M., RAHIM, M., SHAFRY, M., & ALWAN, A. A. (2018). A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN. Journal of Theoretical & Applied Information Technology, 96(4).
[2] Moerland, T., “Steganography and Steganalysisâ€, Leiden Institute of Advanced Computing Science, Silman, J., “Steganography and Steganalysis: An Overviewâ€, SANS Institute, 2001 Jamil, T., “Steganography: The art of hiding information is plain sightâ€, IEEE Potentials, 18:01, 1999
[3] MAHDI HASHIM, M. O. H. A. M. M. E. D., RAHIM, M., & SHAFRY, M. (2017). IMAGE STEGANOGRAPHY BASED ON ODD/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION. Journal of Theoretical & Applied Information Technology, 95(22).
[4] Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28. https://doi.org/10.1109/93.959097.
[5] Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122. https://doi.org/10.1504/IJSISE.2015.067052.
[6] Swain, G., & Lenka, S. K. (2012). LSB array based image steganography technique by exploring the four least significant bits. In Global Trends in Information Systems and Software Applications (pp. 479-488). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_52.
[7] Swain, G., & Lenka, S. K. (2012). A technique for secret communication using a new block cipher with dynamic steganography. International Journal of Security and Its Applications, 6(2), 1-12.
[8] Swain, G., & Lenka, S. K. (2012). A robust image steganography technique using dynamic embedding with two least significant bits. In Advanced Materials Research (Vol. 403, pp. 835-841). Trans Tech Publications.
[9] Subhedar, M. S., & Mankar, V. H. (2014). Status and key issues in image steganography: A survey. Computr science review, 13, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001.
[10] Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46-66. https://doi.org/10.1016/j.image.2018.03.012.
[11] ECE, C., & Mullana, M. M. U. (2011). Image quality assessment techniques pn spatial domain. IJCST, 2(3).
[12] Simmons, G. J. (1984). The prisoners’ problem and the subliminal channel. In Advances in Cryptology (pp. 51-67). Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-4730-9_5.
[13] Knuth, D. E. (1985). Dynamic huffman coding. Journal of algorithms, 6(2), 163-180. https://doi.org/10.1016/0196-6774(85)90036-7.
[14] T. Sharp, Hide 2.1, 2001," http://www.sharpthoughts.org
[15] G. Pulcini, Stegotif,†http:// www.geocities.com/ SiliconValley /9210 /gfree.html
[16] Ulker, M., & Arslan, B. (2018, March). A novel secure model: Image steganography with logistic map and secret key. In Digital Forensic and Security (ISDFS), 2018 6th International Symposium on (pp. 1-5). IEEE.
[17] Sarmah, D. K., & Kulkarni, A. J. (2018). JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms. Information Sciences, 430, 378-396. https://doi.org/10.1016/j.ins.2017.11.027.
[18] Li, B., Li, Z., Zhou, S., Tan, S., & Zhang, X. (2018). New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Transactions on Information Forensics and Security, 13(5), 1242-1257. https://doi.org/10.1109/TIFS.2017.2780805.
[19] Zhang, Y., Qin, C., Zhang, W., Liu, F., & Luo, X. (2018). On the fault-tolerant performance for a class of robust image steganography. Signal Processing, 146, 99-111. https://doi.org/10.1016/j.sigpro.2018.01.011.
[20] Panghal, S., Kumar, S., & Kumar, N. (2016). Enhanced Security of Data using Image Steganography and AES Encryption Technique. International Journal of Computer Applications (0975–8887) Recent Trends in Future Prospective in Engineering & Management Technology 2016.
[21] Debnath, B., Das, J. C., & De, D. (2017). Reversible logic-based image steganography using quantum dot cellular automata for secure nanocommunication. IET Circuits, Devices & Systems, 11(1), 58-67. https://doi.org/10.1049/iet-cds.2015.0245.
[22] AbdelQader, A., & AlTamimi, F. (2017). ANovel IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER. The International Journal of Multimedia & Its Applications. https://doi.org/10.5121/ijma.2017.9101.
[23] Kennedy, J. H., Khan, M. T. A., Ahmed, M. J., & Rasool, M. D. (2017). Image Steganography Based on AES Algorithm with Huffman Coding for Compressionon Grey Images. International Journal of Engineering Science and Computing, [7].
[24] Das, R., & Chatterjee, P. (2017, March). Securing Data Transfer in IoT Employing an Integrated Approach of Cryptography & Steganography. In Proceedings of the International Conference on High Performance Compilation, Computing and Communications (pp. 17-22). ACM.
[25] Tiwari, N., & Shandilya, D. M. (2010). Evaluation of various LSB based methods of image steganography on GIF file format. International Journal of Computer Applications (0975–8887) Volume. https://doi.org/10.5120/1057-1378.
[26] Reddy, H. M., & Raja, K. B. (2011). Wavelet based non-LSB steganography. International Journal of Advanced networking and applications, 3(3), 1203.
[27] HASHIM, M., RAHIM, M., SHAFRY, M., & ALWAN, A. A. (2018). A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN. Journal of Theoretical & Applied Information Technology, 96(4).
[28] Swain, G. (2018). Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution. Arabian Journal for Science and Engineering, 1-10.
[29] Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., & Sajjad, M. (2017). CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications, 76(6), 8597-8626. https://doi.org/10.1007/s11042-016-3383-5.
[30] Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28. https://doi.org/10.1109/93.959097.
[31] Joyce, J. M. (2011). Kullback-leibler divergence. In International encyclopedia of statistical science (pp. 720-722). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04898-2_327.
[32] Cachin, C. (1998, April). An information-theoretic model for steganography. In International Workshop on Information Hiding (pp. 306-318). Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_21.
[33] Borgwardt, K. M., Gretton, A., Rasch, M. J., Kriegel, H. P., Schölkopf, B., & Smola, A. J. (2006). Integrating structured biological data by kernel maximum mean discrepancy. Bioinformatics, 22(14), e49-e57. https://doi.org/10.1093/bioinformatics/btl242.
[34] Holub, V., & Fridrich, J. (2013, June). Digital image steganography using universal distortion. In Proceedings of the first ACM workshop on Information hiding and multimedia security (pp. 59-68). ACM. https://doi.org/10.1145/2482513.2482514 .
[35] Wang, Y., Chen, Q., & Zhang, B. (1999). Image enhancement based on equal area dualistic sub-image histogram equalization method. IEEE Transactions on Consumer Electronics, 45(1), 68-75. https://doi.org/10.1109/30.754419.
[36] Chen, J. (2014). A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Processing: Image Communication, 29(3), 375-384. https://doi.org/10.1016/j.image.2014.01.003.
[37] Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE signal processing letters, 12(6), 441-444. https://doi.org/10.1109/LSP.2005.847889.
[38] Nguyen, B. C., Yoon, S. M., & Lee, H. K. (2006, November). Multi bit plane image steganography. In International Workshop on Digital Watermarking (pp. 61-70). Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_6.
[39] Swain, G., & Lenka, S. K. (2014). Classification of image steganography techniques in spatial domain: a study. International Journal of Computer Science & Engineering Technology, 5(3), 219-232.
[40] Wang, Z., & Bovik, A. C. (2002). A universal image quality index. IEEE signal processing letters, 9(3), 81-84. https://doi.org/10.1109/97.995823.
[41] Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4), 600-612. https://doi.org/10.1109/TIP.2003.819861.
[42] Kumar, R., & Rattan, M. (2012). Analysis of various quality metrics for medical image processing. International Journal of Advanced Research in Computer Science and Software Engineering, 2(11).
[43] Avcibas, I., Memon, N., & Sankur, B. (2003). Steganalysis using image quality metrics. IEEE transactions on Image Processing, 12(2), 221-229. https://doi.org/10.1109/TIP.2002.807363.
[44] Swain, G., & Lenka, S. K. (2014). Classification of spatial domain image steganography techniques: a study. International Journal of Computer Science & Engineering Technology, 5(3), 219-232.
[45] Al-Dmour, H., & Al-Ani, A. (2016). A steganography embedding method based on edge identification and XOR coding. Expert systems with Applications, 46, 293-306. https://doi.org/10.1016/j.eswa.2015.10.024.
[46] Sau, K., Basak, R. K., & Chanda, A. (2013). Image compression based on block truncation coding using clifford algebra. Procedia Technology, 10, 699-706. https://doi.org/10.1016/j.protcy.2013.12.412.
[47] Krenn, R. (2004). Steganography and steganalysis.
[48] Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373. https://doi.org/10.1007/s11042-017-5308-3.
[49] MAHMOOD, A. S., RAHIM, M., & SHAFRY, M. (2017). GENERATING AND EXPANDING OF AN ENCRYPTION KEY BASED ON KNIGHT TOUR PROBLEM. Journal of Theoretical & Applied Information Technology, 95(7).
[50] Jassim F A (2013) A novel steganography algorithm for hiding text in image using five modulus methods. arXiv preprint arXiv:1307.0642.
[51] Muhammad K, Ahmad J, Rehman NU, Jan Z, Qereshi RJ (2014) A secure cyclic steganographic technique for color images using randomization. Tech J Univ Eng Technol Taxila Pakistan 19:57–64.
[52] Muhammad K, Ahmad J, Farman H, Zubair M (2014) A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J Sci Res 22:647–654.
[53] Karim M (2011) a new approach for LSB based image steganography using secret key. In: 14th International Conference on Computer and Information Technology (ICCIT 2011). pp 286–291 https://doi.org/10.1109/ICCITechn.2011.6164800.
[54] Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2016). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications, 75(22), 14867-14893. https://doi.org/10.1007/s11042-015-2671-9.
[55] Baby, D., Thomas, J., Augustine, G., George, E., & Michael, N. R. (2015). A novel DWT based image securing method using steganography. Procedia Computer Science, 46, 612-618. https://doi.org/10.1016/j.procs.2015.02.105.
[56] Rachmawanto, E. H., & Sari, C. A. (2017). Secure Image Steganography Algorithm Based on DCT with OTP Encryption. Journal of Applied Intelligent System, 2(1), 1-11.
[57] Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., & Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22. https://doi.org/10.5121/ijsptm.2014.3102.
[58] Çataltaş, Ö. & Tütüncü, K. (2017, September). Comparison of LSB image steganography technique in different color spaces. In Artificial Intelligence and Data Processing Symposium (IDAP), 2017 International (pp. 1-6). IEEE.
[59] Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software, 81(1), 150-158. https://doi.org/10.1016/j.jss.2007.01.049.
[60] Dhar, P. K., Kaium, A., & Shimamura, T. (2018). Image Steganography Based on Modified LSB Substitution Method and Data Mapping. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 18(3), 155-160.
[61] Juneja, M., & Sandhu, P. S. (2013). A new approach for information security using an improved steganography technique. Journal of Information Processing Systems, 9(3), 405-424. https://doi.org/10.3745/JIPS.2013.9.3.405.
[62] Adnan Abdul-Aziz Gutub, "Pixel Indicator Technique for RGB Image Steganography," Journal of Emerging Technologies in Web Intelligence, Vol. 2, No. 1, pp. 56-64, February 2010. doi:10.4304/jetwi.2.1.56-64 https://doi.org/10.4304/jetwi.2.1.56-64.
[63] Jassim, F. A. (2013). A novel steganography algorithm for hiding text in image using five-modulus method. arXiv preprint arXiv:1307.0642.
[64] Karim, S. M., Rahman, M. S., & Hossain, M. I. (2011, December). A new approach for LSB based image steganography using secret key. In Computer and Information Technology (ICCIT), 2011 14th International Conference on (pp. 286-291). IEEE.
[65] Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M., & Baik, S. W. (2015). A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS, 9(5), 1938-1962.
[66] Alam, S., Kumar, V., Siddiqui, W. A., & Ahmad, M. (2014, February). Key dependent image steganography using edge detection. In Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on (pp. 85-88). IEEE.
[67] Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816. https://doi.org/10.1007/s11071-013-1105-3.
[68] Aziz, M., Tayarani-N, M. H., & Afsar, M. (2015). A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dynamics, 80(3), 1271-1290. https://doi.org/10.1007/s11071-015-1943-2.
[69] Ghebleh, M., & Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907. https://doi.org/10.1016/j.cnsns.2013.10.014.
[70] Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., & Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22. https://doi.org/10.5121/ijsptm.2014.3102.
[71] Sharif, A., Mollaeefar, M., & Nazari, M. (2017). A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools and Applications, 76(6), 7849-7867. https://doi.org/10.1007/s11042-016-3398-y.
[72] Bailey, K., & Curran, K. (2006). An evaluation of image based steganography methods. Multimedia Tools and Applications, 30(1), 55-88. https://doi.org/10.1007/s11042-006-0008-4.
[73] Yu, J. G., Yoon, E. J., Shin, S. H., & Yoo, K. Y. (2008, April). A new image steganography based on twok correction and edge-detection. In Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on (pp. 563-568). IEEE.
[74] Lie, W. N., & Chang, L. C. (1999). Data hiding in images with adaptive numbers of least significant bits based on the human visual system. In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on (Vol. 1, pp. 286-290). IEEE.
[75] Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9-10), 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6.
[76] Chandramouli, R., Kharrazi, M., & Memon, N. (2003, October). Image steganography and steganalysis: Concepts and practice. In International Workshop on Digital Watermarking (pp. 35-49). Springer, Berlin, Heidelberg.
[77] Dhaka, V., Poonia, R. C., & Singh, Y. V. (2013). A Novel Algorithm for Image Steganography Based on Effective Channel Selection Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 3(8).
[78] Singh, A., & Singh, H. (2015, March). An improved LSB based image steganography technique for RGB images. In Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on (pp. 1-4). IEEE.
[79] Chauhan, S., Kumar, J., & Doegar, A. (2017, February). Multiple layer text security using variable block size cryptography and image steganography. In Computational Intelligence & Communication Technology (CICT), 2017 3rd International Conference on (pp. 1-7). IEEE.
[80] Khodaei, M., & Faez, K. (2010, June). Image hiding by using genetic algorithm and LSB substitution. In International Conference on Image and Signal Processing (pp. 404-411). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13681-8_47.
[81] Rajendran, S., & Doraipandian, M. (2017). Chaotic Map Based Random Image Steganography Using LSB Technique. IJ Network Security, 19(4), 593-598.
[82] Wu, H. C., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2005). Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings-Vision, Image and Signal Processing, 152(5), 611-615. https://doi.org/10.1049/ip-vis:20059022.
[83] Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2010). Varied PVD+ LSB evading detection programs to spatial domain in data embedding systems. Journal of Systems and Software, 83(10), 1635-1643. https://doi.org/10.1016/j.jss.2010.03.081.
[84] Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image processing, 6(6), 677-686. https://doi.org/10.1049/iet-ipr.2011.0059.
[85] Shen, S. Y., & Huang, L. H. (2015). A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security, 48, 131-141. https://doi.org/10.1016/j.cose.2014.07.008.
[86] Lusson, F., Bailey, K., Leeney, M., & Curran, K. (2013). A novel approach to digital watermarking, exploiting colour spaces. Signal Processing, 93(5), 1268-1294. https://doi.org/10.1016/j.sigpro.2012.10.018.
[87] Balasubramanian, C., Selvakumar, S., & Geetha, S. (2014). High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia tools and applications, 73(3), 2223-2245. https://doi.org/10.1007/s11042-013-1640-4.
[88] Li, B., Wang, M., Huang, J., & Li, X. (2014, October). A new cost function for spatial image steganography. In Image Processing (ICIP), 2014 IEEE International Conference on (pp. 4206-4210). IEEE.
-
Downloads
-
How to Cite
Hashim, M. M., Rahim, M. S. M., Johi, F. A., Taha, M. S., & Hamad, H. S. (2018). Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. International Journal of Engineering & Technology, 7(4), 3505-3514. https://doi.org/10.14419/ijet.v7i4.21726Received date: 2018-11-26
Accepted date: 2018-11-26