Abstract
This chapter deals with two main aspects; the first one is concerned with introducing an improved robust and secure image steganography system. The original algorithm presented by Mali et al. gives adequate results in terms of robustness; however, the algorithm cannot be considered reliable, as some data is lost. In order to overcome the problem of the lost data due to the misidentified blocks, an embedding map was proposed to specify the location of the blocks that can be used for embedding a secret message. Such a technique, the embedding map, is very important if one needs to start the extracting phase correctly and accurately. Besides, any loss in the embedding map will in turn lead to data loss. Consequently, the embedding map will be hidden using SURF and DWT to assure robustness and to increase the level of security of the proposed system. The secret data can be embedded using the original algorithm (DCT -based) proposed by Mali et al. More so, the experimental results show the ability of the new algorithm, namely IRSS , to overcome the problem of losing data even with JPEG compression or Gaussian noise.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.
Abdelwahab, A. A., & Hassaan, L. A. (2008, March 18–20). A discrete wavelet transform based technique for image data hiding. Paper presented at the radio science conference, 2008. NRSC 2008. National.
Al-Jaber, A., & Aloqily, I. (2003). High quality steganography model with attacks detection. Information Technology Journal, 2, 116–127.
Areepongsa, S., Syed, Y. F., Kaewkamnerd, N., & Rao, K. R. (2000). Steganography for a low bit-rate wavelet based image coder. Paper presented at the image processing, 2000. Proceedings. 2000 International Conference on.
Alattar, A. M. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13(8), 1147–1156.
Cover, K. S. (2006). Multiexponential reconstruction algorithm immune to false positive peak detection. Review of Scientific Instruments 77,075101 (2006); https://doi.org/10.1063/1.2206780.
Cox, I., Miller, M., Bloom, J., & Honsinger, C. (2002). Digital Watermarking. Journal of Electronic Imaging, 11(3), 414–414.
Fallahpour, M., & Sedaaghi, M. H. (2007). High capacity lossless data hiding based on histogram modification. IEICE Electronics Express, 4(7), 205–210.
Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006a). Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine, 10(4), 722–732.
Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006b). Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44(8), 619–631.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b, April). Characteristic region based image steganography using speeded-up robust features technique. Paper presented at the 1st International Conference on Future Communication Network (ICFCN’12). IEEE international conference, Iraq, Baghdad.
Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences, 7(1), 35–55.
Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.
Jun, T. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890–896.
Kundur, D., & Hatzinakos, D. (1998). Towards a telltale watermarking technique for tamper-proofing. Image Processing, 1998. ICIP 98. Proceedings. Chicago, IL, USA, USA.
Kundur, D., & Hatzinakos, D. (1999). Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE, 87(7), 1167–1180.
Lee, Y-K., & Chen, L-H. (2000). A secure robust image steganographic model. Paper presented at the tenth national conference of information security.
Li, L., Qian, J., & Pan, J. S. (2011). Characteristic region based watermark embedding with RST invariance and high capacity. AEU - International Journal of Electronics and Communications, 65(5), 435–442.
Logeshwaran, R., & Paul, I. J. L. (2010, January). Performance study on the suitability of reed solomon codes in WiMAX. Paper presented at the wireless communication and sensor computing, 2010. International Conference on ICWCSC 2010.
Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.
Malik, F., & Baharudin, B. (2013). The statistical quantized histogram texture features analysis for image retrieval based on median and laplacian filters in the DCT domain. International Arab Journal of Information Technology, 10(6), 1–9.
Marvel, L. M., Boncelet Jr., C. G., & Retter, C. T. (1999). Spread spectrum image steganography. IEEE Transactions on Image Processing, 8(8), 1075–1083.
Masakawa, T., & Ochiai, H. (2007, March). Design of reed-solomon codes for OFDM systems with clipping and filtering. Paper presented at the wireless communications and networking conference, 2007. WCNC 2007. IEEE.
Morgari, G., Spicciola, M., Deantonio, S., & Elia, M. (2008). Steganographic schemes for noisy communication channels. Journal of Contemporary Engineering Sciences, 1(1), 27–39.
Munuera, C. (2007). Steganography and error-correcting codes. Signal Processing, 87(6), 1528–1533.
Nayak, J., Bhat, P. S., Kumar, M. S., & Rajendra Acharya, U. (2004). Reliable transmission and storage of medical images with patient information using error control codes. India Annual Conference, 2004. Proceedings of the IEEE INDICON 2004, Kharagpur, India.
Nayak, J., Subbanna Bhat, P., Acharya, U. R., & Sathish Kumar, M. (2009). Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems, 33(3), 163–171.
Reed, I. S., He, R., Chen, X., & Truong, T. K. (1998). Application of Grobner bases for decoding Reed-Solomon codes used on CDs. IEEE Proceedings – Computers and Digital Techniques, 145(6), 369–376.
Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300–304.
Singh, R. P., Khan, M. A. A., Khan, M., & Singh, N. (2010). Spread spectrum image steganography in multimedia messaging service of mobile phones. International Journal of Electronics Engineering, 2(2), 365–369.
Smith, J. R., & Comiskey, B. O. (1996). Modulation and information hiding in images. Paper presented at the proceedings of the first international workshop on information hiding.
Vries, L. B., Immink, K. A., Nijboer, J. G., Hoeve, H., Philips, N. V., Doi, T. T., & Odaka, K. (1980). The compact disc digital audio system: Modulation and error correction. Paper presented at the 67th AES Convention, No. 1674(H-8).
Zhang, W., & Li, S. (2005). Steganographic codes — a new problem of coding theory. Journal of Latex Class Files, 1(11), 7.
Zhicheng, N., Yun-Qing, S., Ansari, N., & Wei, S. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Yahya, A. (2019). An Enhanced Robust and Protected Image Steganographic System. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-78597-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78535-6
Online ISBN: 978-3-319-78597-4
eBook Packages: EngineeringEngineering (R0)