Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 2, pp 1511–1546 | Cite as

Multi-bit robust image steganography based on modular arithmetic

  • Biswajita DattaEmail author
  • Sudipta Roy
  • Subhranil Roy
  • Samir Kumar Bandyopadhyay
Article
  • 77 Downloads

Abstract

The main objective is to design a robust algorithm which can hide multiple target bits without direct replacement of the bits of cover image and at the same time maintain perceptibility of carrier medium by reducing the distortion rate by intensity adjustment. The method uses the strength of modular arithmetic for embedding target data and at the same time able to solve the overlapping problem. In this double layer security technique first the target bits are converted into another number system and then these converted digits are embedded by adjusting the pixel intensities in such a way so that modulo operation retrieve data correctly at the receiver side. The proposed technique is tested on different class of images and analyzed based on different parameters. The histograms are distorted significantly for more than four bit insertion and the average PSNR is 34.7 for four multi-bit insertion with 100% payload. Different standard LSB detectors like SP, WS etc. are fail to detect hidden bits and at the same time the statistical attack on stego media unable to get success on stego images. The performance of the proposed technique is measured by Stirmark Benchmark 4.0 whereas the security strength is calculated through KL divergence which establishes it as a more secure algorithm. The Average Embedding Capacity of this technique is four. The work shows better performances than many state-of-the-art-works. The method reduces the distortion rate to half of the standard multi-bit LSB technique. This helps to retain imperceptibility with the increase of capacity through multi-bit insertion. The robustness is introduced in this spatial domain technique by embedding target data without direct replacement of cover bits. This algorithm uses the NP-complete nature of modulo operation to increase security and at the same time introduces parallelism to reduce time complexity.

Keywords

Image steganography Radix conversion Modulo operator Multi-bit steganography Embedding capacity Robustness 

Notes

References

  1. 1.
    Andreas W, Pfitzmann A (1999) Attacks on steganographic systems In: Proc. of 3rd International workshop on information hiding, September 1999, pp 61–76Google Scholar
  2. 2.
    Aryal A, Motegi K, Imaizumi S, Aoki N (2015) Improvement of multi-bit information embedding algorithm for palette-based images. In: Lopez J, Mitchell C (eds) Information Security. ISC 2015. Lecture Notes in Computer Science, vol 9290. Springer, ChamGoogle Scholar
  3. 3.
    Asai H (1976) A recursive radix conversion formula and its application to multiplication and division. Elsevier Journal of Computers & Mathematics with Applications 2(3–4):255–265CrossRefGoogle Scholar
  4. 4.
    Bailey K, Curran K (2006) An evaluation of image based steganography methods. Journal of Multimedia Tools and Applications 30(1):55–88CrossRefGoogle Scholar
  5. 5.
    Bergman M (2016) It’s Hard to Get Good (Security) Help These Days. IEEE Consumer Electronics Magazine 5(3):132–133CrossRefGoogle Scholar
  6. 6.
    Boute RT (1992) The Euclidean definition of the functions div and mod. ACM Trans Program Lang Syst (TOPLAS) (ACM Press (New York, NY, USA)) 14(2):127–144CrossRefGoogle Scholar
  7. 7.
    Brent RP, Zimmermann P (2010) Modern Computer Arithmetic, Cambridge Monographs on Computational and Applied Mathematics (No. 18). Cambridge University Press, Cambridge, pp 236Google Scholar
  8. 8.
    Cachin C (2004) An information theoretic model for steganography. Inf Comput 192:41–56MathSciNetCrossRefGoogle Scholar
  9. 9.
    Cha S–H, Srihari SN (2002) On measuring the distance between histograms. Pattern Recognition, the Journal of Pattern Recognition Society 35:1355–1370CrossRefGoogle Scholar
  10. 10.
    Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727–752CrossRefGoogle Scholar
  11. 11.
    Chugh G, Yadav R, Saini R (2014) A New Image Steganographic Approach Based on Mod Factor for RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition 7(3):27–44CrossRefGoogle Scholar
  12. 12.
    Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB Steganography via Sample Pair Analysis. In: the Proc. of 5th Information Hiding Workshop, Vol 2578, pp 355–372Google Scholar
  13. 13.
    Dumitrescu D, Stan IM, Simion E (2017) Steganography techniques, IACR Cryptology ePrint Archive (2017). Available at: https://eprint.iacr.org/2017/341.pdf. Accessed 16th April 2018
  14. 14.
    Feng B, Lu W, Sun W (2015) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Transactions on Information Forensics and Security 10(2):243–255CrossRefGoogle Scholar
  15. 15.
    Fridrich J, Kodovsk J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432–444CrossRefGoogle Scholar
  16. 16.
    Gonzalez RC, Woods RE (2002) Digital Image Processing (2nd ed). Prentice Hall, IndiaGoogle Scholar
  17. 17.
    Hussain M, Wahab AWA, Javed N, Jung KH (2016) Recursive information hiding scheme through LSB, PVD shift, and MPE. IETE Tech Rev J 35(1):1–11Google Scholar
  18. 18.
    Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur, Springer 8:1–14Google Scholar
  19. 19.
    Ker AD (2007) Optimally weighted least-squares steganalysis. In: Delp Edward J., Wong P. W., (eds) Proc. of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX 6505, pp 16.  https://doi.org/10.1117/12.704606
  20. 20.
    Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. In: Proc. SPIE, Vol 6819, pp 5–17Google Scholar
  21. 21.
    Kuo W-C, Kuo S-H, Wu L-C (2015) Multi-Bit Data Hiding Scheme for Compressing Secret Messages. Applied Sciences Journal 5(4):1033–1049CrossRefGoogle Scholar
  22. 22.
    Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging ‘99 Security and Watermarking of Multimedia Contents 3657:219–239Google Scholar
  23. 23.
    Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2017) A Novel Data Hiding Algorithm for High Dynamic Range Images. IEEE Transactions on Multimedia 19(1):196–211CrossRefGoogle Scholar
  24. 24.
    Luo W, Huang F, Huang J (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214CrossRefGoogle Scholar
  25. 25.
    Modular Arithmetic-Cryptographer's Mathematics. Available at: http://www2.sunysuffolkedu/fultonj/MA22/Modular%20Arithmetic%20&%20Cryptography.pdf
  26. 26.
    Mukherjee I, Paul G (2013) Efficient Multi-bit Image Steganography in Spatial Domain. Information Systems Security, Springer, LNCS, Chapter 29, vol 8303, pp 270–284Google Scholar
  27. 27.
    Nguyen BC, Yoon SM, Lee HK (2006) Multi Bit Plane Image Steganography. IWDW, LNCS 4283, pp 61–70Google Scholar
  28. 28.
    Paul G, Davidson I, Mukherjee I, Ravi SS (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 75(5):1–27Google Scholar
  29. 29.
    Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information Hiding - A Survey. In: Proc. of the IEEE, special issue protection of multimedia content, vol 87, no. 7, pp 1062–1078Google Scholar
  30. 30.
    Pevny T, Filler T, Bas P (2010) Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. Information Hiding, Springer, LNCS, Berlin, Chapter 20, vol 6387, pp 161–177Google Scholar
  31. 31.
    Prashanti G, Sandhyarani K (2015) A New Approach for Data Hiding with LSB Steganography. Advances in Intelligent Systems and Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 70, vol 338, pp 423–430Google Scholar
  32. 32.
    Pund-Dange S, Desai CG (2017) Data Hiding Technique using Catalan-Lucas Number Sequence. Indian Journal of Science and Technology 10(4):1–6CrossRefGoogle Scholar
  33. 33.
    Rajopadhye S. Number Systems and Radix Conversion. Available at: www.cs.colostate.edu/~cs270/.Spring12/Notes/NumberSystems
  34. 34.
    Sedighi V, Fridrich J, Cogranne R (2015) Content Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. In: Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol 9409, San Francisco, CAGoogle Scholar
  35. 35.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715MathSciNetCrossRefGoogle Scholar
  36. 36.
    Shu X, Zhang J, Yao DD, Feng WC (2016) Fast Detection of Transformed Data Leaks. IEEE Transactions on Information Forensics and Security 11:528–542CrossRefGoogle Scholar
  37. 37.
    Singh S, Attri VK (2015) State-of-the-art Review on Steganographic Techniques. International Journal of Signal Processing, Image Processing and Pattern Recognition 8(7):161–170CrossRefGoogle Scholar
  38. 38.
    Stanley CA Pairs of Values and the Chi-squaredAttack. Available at: orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf
  39. 39.
    Test Images, DECSAI image Database, Available at: http://decsai.ugr.es/cvg/dbimagenes/
  40. 40.
    The information hiding homepage, “Photo Database”, Available at: http://www.petitcolas.net/watermarking/image_database
  41. 41.
  42. 42.
    USC-SIPI Image Database, Vol. 3: Miscellaneous. Available at http://sipi.usc.edu/database/
  43. 43.
    Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications 34(2):142–151CrossRefGoogle Scholar
  44. 44.
    Vatai E Discrete mathematics I-Number theory Congruence. Available at: http://compalg.inf.elte.hu/~vatai/dm1enorg/l07-congruences.pdf
  45. 45.
    Wang S–J (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Math Comput 164:99–116MathSciNetzbMATHGoogle Scholar
  46. 46.
    Wang C–M, Wu N-I, Tsai C-S, Hwang M-S (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158CrossRefGoogle Scholar
  47. 47.
    Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251–1263CrossRefGoogle Scholar
  48. 48.
    Xie L, Zhu L, Chen G (2016) Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval. Multimedia Tools and Applications 75(15):9185–9204CrossRefGoogle Scholar
  49. 49.
    Yang C-Y, Wang W–F (2015) Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. Genetic and Evolutionary Computing, Springer, Advances in Intelligent Systems and Computing, Chapter 43, Vol. 329, pp 145–154Google Scholar
  50. 50.
    Zhu L, Jin H, Zheng R, Feng X (2014) Effective naive Bayes nearest neighbor based image classification on GPU. J Supercomput 68(2):820–848CrossRefGoogle Scholar
  51. 51.
    Zhu L, Shen J, Xie L (2015) Topic Hypergraph Hashing for Mobile Image Retrieval. In: Proc. of the 23rd ACM International Conference on Multimedia, Australia, pp 843–846Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Biswajita Datta
    • 1
    Email author
  • Sudipta Roy
    • 2
    • 3
  • Subhranil Roy
    • 1
  • Samir Kumar Bandyopadhyay
    • 3
  1. 1.Department of Computer Science & EngineeringSt. Thomas’ College of Engineering and TechnologyKolkataIndia
  2. 2.Department of Computer Science & EngineeringUniversity of CalcuttaKolkataIndia
  3. 3.Department of Computer Science & EngineeringCalcutta University Technology Campus, Calcutta UniversityKolkataIndia

Personalised recommendations