A new digital image steganography algorithm based on visible wavelength

Stenography is the science that ensures secret communication through multimedia carriers such as image, audio, and video files. The ultimate end of stenography is to hide the secret data in the carrier file so that they are not detected. To that end, stenography applications should have such features as undetectability; robustness; resistance to various images process, sing methods, and compression; and capacity of the hidden data. At the same time, those features distinguish stenography applications from watermarking and cryptography applications. This study is different from other studies in the literature in that the undetectability parameter has been achieved through hiding data in line with the human sight system. In that sense, it has been determined through using the visible light wavelength limits of the pixel-carrying file in which the data are to be hidden. The peak signal-to-noise ratio has been used to evaluate the detectability and quality of the stego-image in which the secret information is embedded as a result of the data embedding process.

A new digital image steganography algorithm based on visible wavelength

Stenography is the science that ensures secret communication through multimedia carriers such as image, audio, and video files. The ultimate end of stenography is to hide the secret data in the carrier file so that they are not detected. To that end, stenography applications should have such features as undetectability; robustness; resistance to various images process, sing methods, and compression; and capacity of the hidden data. At the same time, those features distinguish stenography applications from watermarking and cryptography applications. This study is different from other studies in the literature in that the undetectability parameter has been achieved through hiding data in line with the human sight system. In that sense, it has been determined through using the visible light wavelength limits of the pixel-carrying file in which the data are to be hidden. The peak signal-to-noise ratio has been used to evaluate the detectability and quality of the stego-image in which the secret information is embedded as a result of the data embedding process.

___

  • ¨ O. C ¸ etin, A Data Embedding Algorithm Design for Video Applications Using a New Steganography Approach, PhD, Sakarya University, Sakarya, Turkey, 2008.
  • A. Cheddad, J. Condell, K. Curran, P. McKevitt, “Digital image steganography: survey and analysis of current methods”, Signal Processing, Vol. 90, pp. 727–752, 2010.
  • O. C ¸ etin, A.T. ¨ Ozcerit, “˙IGS tabanl yeni bir video–s r¨ ortme y¨ ontemi”, Proceedings of the 3rd Information Security and Cryptology Conference with International Participation, pp. 84–88, 2008 (article in Turkish).
  • B.T. McBride, G.L. Peterson, S.C. Gustafson, “A new blind method for detecting novel steganography”, Digital Investigation, Vol. 2, pp. 50–70, 2005.
  • J.J. Chae, D. Mukherjee, B.S. Manjunath, “Color image embedding using multidimensional lattice structures”, Proceedings of the IEEE International Conference on Image Processing, Vol. 1, pp. 460–464, 1998.
  • C.K. Chan, L.M. Cheng, “Hiding data in images by simple LSB substitution”, Pattern Recognition, Vol. 37, pp. 469–474, 2004.
  • C.C. Chang, J.Y. Hsiao, C.S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy”, Pattern Recognition, Vol. 36, pp. 1583–1595, 2003.
  • C.C. Thien, J.C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function”, Pattern Recognition, Vol. 36, pp. 2875–2881, 2003.
  • R.Z. Wang, C.F. Lin, J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition, Vol. 34, pp. 671–683, 2001.
  • C.C. Chang, T.S. Chen, L.Z. Chung, “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, Vol. 141, pp. 123–138, 2002.
  • M. Iwata, K. Miyake, A. Shiozaki, “Digital steganography utilizing features of JPEG images”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E87-A, pp. 929–936, 2004.
  • H. Noda, J. Spaulding, M.N. Shirazi, E. Kawaguchi, “Application of bit-plane decomposition steganography to JPEG2000 encoded images”, IEEE Signal Processing Letters, Vol. 9, pp. 410–413, 2002.
  • V.M. Potdar, S. Han, E. Chang, “Fingerprinted secret sharing steganography for robustness against image cropping attacks”, Proceedings of the 3rd IEEE International Conference on Industrial Informatics, pp. 717–724, 2005.
  • M.H. Shirali-Shahreza, M. Shirali-Shahreza, “A new approach to Persian/Arabic text steganography”, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, pp. 310–315, 2006.
  • J. Fridrich, M. Goljan, D. Hogeg, “Steganalysis of JPEG images: breaking the F5 algorithm”, Revised Papers from the 5th International Workshop on Information Hiding, pp. 310–323, 2002.
  • A.M. Fard, M. Akbarzadeh-T, F. Varasteh-A, “A new genetic algorithm approach for secure JPEG steganography”, Proceedings of the IEEE International Conference on Engineering of Intelligent Systems, pp. 1–6, 2006.
  • N. Provos, P. Honeyman, “Hide and seek: an introduction to steganography”, IEEE Security and Privacy, Vol. 1, pp. 32–44, 2003.
  • P. Wayner, Disappearing Cryptography, 2nd ed., Burlington, MA, USA, Morgan Kaufmann Publishers, 2002.
  • A. Westfeld, “F5—A steganographic algorithm: high capacity despite better steganalysis”, Proceedings of the 4th International Workshop on Information Hiding, Vol. 2137, pp. 289–302, 2001.
  • A.A. Abdelwahab, L.A. Hassan, “A discrete wavelet transform based technique for image data hiding”, Proceedings of the 25th National Radio Science Conference, pp. 1–9, 2008.
  • S ¸. Sa˘ gıro˘ glu, M. Tun¸ ckanat, G¨ uvenli ˙Internet Haberle¸smesi ˙I¸ cin Bir Yazılım: T¨ urksteg, Kayseri, Turkey, Erciyes University, 2002 (in Turkish).
  • T. Morkel, J.H.P. Eloff, M.S. Olivier, “An overview of image steganography”, Proceedings of the 5th Annual Information Security South Africa Conference. M.D. Hassan, Comparison for Steganalysis Approaches, MSc, Gazi University, Ankara, Turkey, 2008.
  • Wikipedia, RGB Renk Uzayı, at http://tr.wikipedia.org/wiki/RGB renk uzay%C4%B1 (last accessed 10 January 2013; in Turkish).
  • E. ¨ Oner, Tekstil End¨ ustrisinde Renk ¨ Ol¸ c¨ um¨ u, Marmara University, Paper No: 672, ˙Istanbul, 2001 (in Turkish).
  • O. Cetin, A.T. Ozcerit, “A new steganography algorithm based on color histograms for data embedding into raw video streams”, Computers & Security, Vol. 28, pp. 670–682, 2009.
  • Wikipedia, EM spectrum.svg, at http://en.wikipedia.org/wiki/File:EM spectrum.svg (last accessed 10 January 2013).
  • M. Rabbani, P.W. Jones, Digital Image Compression Techniques, Vol. TT7, Washington, SPIE Optical Engineering Press, 1991.
  • A.N. Netravali, B.G. Haskell, Digital Pictures: Representation, Compression, and Standards, 2nd ed., New York, Plenum Press, 1995.
  • Z. Wang, A.C. Bovik, “A universal image quality index”, IEEE Signal Processing Letters, Vol. 9, pp. 81–84, 2002. Y. Yalman, F. Akar, I. Erturk, “An image interpolation based reversible data hiding method using R-weighted coding”, 13th IEEE International Conference on Computational Science and Engineering, pp. 346–350, 2010.
  • Z. Wang, A.C. Bovik, H.D. Sheikh, E.P. Simoncelli, “Image quality assessment: from error visibility to structural similarity”, IEEE Transactions on Image Processing, Vol. 13, pp. 600–612, 2004.
  • K. Egiazarian, J. Astola, N. Ponomarenko, V. Lukin, F. Battisti, M. Carli, “New full-reference quality metrics based on HVS”, Proceedings of the 2nd International Workshop on Video Processing and Quality Metrics, 2006.
  • C.Y. Lin, C.C. Chang, Y.Z. Wang, “Reversible steganographic method with high payload for JPEG images”, IEICE Transactions on Information and Systems, Vol. E91.D, pp. 836–845, 2008.
  • J. Fridrich, R. Du, M. Long, “Steganalysis of LSB encoding in color images, IEEE International Conference on Multimedia and Expo, Vol. 3, pp. 1279–1282, 2000.