Skip to main content

An Enhanced Robust and Protected Image Steganographic System

  • Chapter
  • First Online:
Steganography Techniques for Digital Images
  • 1099 Accesses

Abstract

This chapter deals with two main aspects; the first one is concerned with introducing an improved robust and secure image steganography system. The original algorithm presented by Mali et al. gives adequate results in terms of robustness; however, the algorithm cannot be considered reliable, as some data is lost. In order to overcome the problem of the lost data due to the misidentified blocks, an embedding map was proposed to specify the location of the blocks that can be used for embedding a secret message. Such a technique, the embedding map, is very important if one needs to start the extracting phase correctly and accurately. Besides, any loss in the embedding map will in turn lead to data loss. Consequently, the embedding map will be hidden using SURF and DWT to assure robustness and to increase the level of security of the proposed system. The secret data can be embedded using the original algorithm (DCT -based) proposed by Mali et al. More so, the experimental results show the ability of the new algorithm, namely IRSS , to overcome the problem of losing data even with JPEG compression or Gaussian noise.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.

    Article  Google Scholar 

  • Abdelwahab, A. A., & Hassaan, L. A. (2008, March 18–20). A discrete wavelet transform based technique for image data hiding. Paper presented at the radio science conference, 2008. NRSC 2008. National.

    Google Scholar 

  • Al-Jaber, A., & Aloqily, I. (2003). High quality steganography model with attacks detection. Information Technology Journal, 2, 116–127.

    Article  Google Scholar 

  • Areepongsa, S., Syed, Y. F., Kaewkamnerd, N., & Rao, K. R. (2000). Steganography for a low bit-rate wavelet based image coder. Paper presented at the image processing, 2000. Proceedings. 2000 International Conference on.

    Google Scholar 

  • Alattar, A. M. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13(8), 1147–1156.

    Article  MathSciNet  Google Scholar 

  • Cover, K. S. (2006). Multiexponential reconstruction algorithm immune to false positive peak detection. Review of Scientific Instruments 77,075101 (2006); https://doi.org/10.1063/1.2206780.

    Article  Google Scholar 

  • Cox, I., Miller, M., Bloom, J., & Honsinger, C. (2002). Digital Watermarking. Journal of Electronic Imaging, 11(3), 414–414.

    Article  Google Scholar 

  • Fallahpour, M., & Sedaaghi, M. H. (2007). High capacity lossless data hiding based on histogram modification. IEICE Electronics Express, 4(7), 205–210.

    Article  Google Scholar 

  • Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006a). Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine, 10(4), 722–732.

    Article  Google Scholar 

  • Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006b). Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44(8), 619–631.

    Article  Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b, April). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st International Conference on Future Communication Network (ICFCN’12). IEEE international conference, Iraq, Baghdad.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences, 7(1), 35–55.

    Google Scholar 

  • Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.

    Google Scholar 

  • Jun, T. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.

    Article  Google Scholar 

  • Kundur, D., & Hatzinakos, D. (1998). Towards a telltale watermarking technique for tamper-proofing. Image Processing, 1998. ICIP 98. Proceedings. Chicago, IL, USA, USA.

    Google Scholar 

  • Kundur, D., & Hatzinakos, D. (1999). Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE, 87(7), 1167–1180.

    Article  Google Scholar 

  • Lee, Y-K., & Chen, L-H. (2000). A secure robust image steganographic model. Paper presented at the tenth national conference of information security.

    Google Scholar 

  • Li, L., Qian, J., & Pan, J. S. (2011). Characteristic region based watermark embedding with RST invariance and high capacity. AEU - International Journal of Electronics and Communications, 65(5), 435–442.

    Article  Google Scholar 

  • Logeshwaran, R., & Paul, I. J. L. (2010, January). Performance study on the suitability of reed solomon codes in WiMAX. Paper presented at the wireless communication and sensor computing, 2010. International Conference on ICWCSC 2010.

    Google Scholar 

  • Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.

    Article  MathSciNet  Google Scholar 

  • Malik, F., & Baharudin, B. (2013). The statistical quantized histogram texture features analysis for image retrieval based on median and laplacian filters in the DCT domain. International Arab Journal of Information Technology, 10(6), 1–9.

    Google Scholar 

  • Marvel, L. M., Boncelet Jr., C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075–1083.

    Article  Google Scholar 

  • Masakawa, T., & Ochiai, H. (2007, March). Design of reed-solomon codes for OFDM systems with clipping and filtering. Paper presented at the wireless communications and networking conference, 2007. WCNC 2007. IEEE.

    Google Scholar 

  • Morgari, G., Spicciola, M., Deantonio, S., & Elia, M. (2008). Steganographic schemes for noisy communication channels. Journal of Contemporary Engineering Sciences, 1(1), 27–39.

    Google Scholar 

  • Munuera, C. (2007). Steganography and error-correcting codes. Signal Processing, 87(6), 1528–1533.

    Article  Google Scholar 

  • Nayak, J., Bhat, P. S., Kumar, M. S., & Rajendra Acharya, U. (2004). Reliable transmission and storage of medical images with patient information using error control codes. India Annual Conference, 2004. Proceedings of the IEEE INDICON 2004, Kharagpur, India.

    Google Scholar 

  • Nayak, J., Subbanna Bhat, P., Acharya, U. R., & Sathish Kumar, M. (2009). Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems, 33(3), 163–171.

    Article  Google Scholar 

  • Reed, I. S., He, R., Chen, X., & Truong, T. K. (1998). Application of Grobner bases for decoding Reed-Solomon codes used on CDs. IEEE Proceedings – Computers and Digital Techniques, 145(6), 369–376.

    Article  Google Scholar 

  • Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300–304.

    Article  MathSciNet  Google Scholar 

  • Singh, R. P., Khan, M. A. A., Khan, M., & Singh, N. (2010). Spread spectrum image steganography in multimedia messaging service of mobile phones. International Journal of Electronics Engineering, 2(2), 365–369.

    Google Scholar 

  • Smith, J. R., & Comiskey, B. O. (1996). Modulation and information hiding in images. Paper presented at the proceedings of the first international workshop on information hiding.

    Chapter  Google Scholar 

  • Vries, L. B., Immink, K. A., Nijboer, J. G., Hoeve, H., Philips, N. V., Doi, T. T., & Odaka, K. (1980). The compact disc digital audio system: Modulation and error correction. Paper presented at the 67th AES Convention, No. 1674(H-8).

    Google Scholar 

  • Zhang, W., & Li, S. (2005). Steganographic codes — a new problem of coding theory. Journal of Latex Class Files, 1(11), 7.

    Google Scholar 

  • Zhicheng, N., Yun-Qing, S., Ansari, N., & Wei, S. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yahya, A. (2019). An Enhanced Robust and Protected Image Steganographic System. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78597-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78535-6

  • Online ISBN: 978-3-319-78597-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics